CVE-2021-36786
https://notcve.org/view.php?id=CVE-2021-36786
The miniorange_saml (aka Miniorange Saml) extension before 1.4.3 for TYPO3 allows Sensitive Data Exposure of API credentials and private keys. La extensión miniorange_saml (también se conoce como Miniorange Saml) versiones anteriores a 1.4.3 para TYPO3, permite una exposición de datos confidenciales de credenciales y claves privadas de la API. • https://typo3.org/help/security-advisories/security https://typo3.org/security/advisory/typo3-ext-sa-2021-011 • CWE-922: Insecure Storage of Sensitive Information •
CVE-2021-36785
https://notcve.org/view.php?id=CVE-2021-36785
The miniorange_saml (aka Miniorange Saml) extension before 1.4.3 for TYPO3 allows XSS. La extensión miniorange_saml (también se conoce como Miniorange Saml) versiones anteriores a 1.4.3 para TYPO3, permite un ataque de tipo XSS. • https://typo3.org/help/security-advisories/security https://typo3.org/security/advisory/typo3-ext-sa-2021-011 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2021-33712
https://notcve.org/view.php?id=CVE-2021-33712
A vulnerability has been identified in Mendix SAML Module (All versions < V2.1.2). The configuration of the SAML module does not properly check various restrictions and validations imposed by an identity provider. This could allow a remote authenticated attacker to escalate privileges. Se ha identificado una vulnerabilidad en el módulo SAML de Mendix (todas las versiones anteriores a V2.1.2). La configuración del módulo SAML no comprueba apropiadamente varias restricciones y validaciones impuestas por un proveedor de identidad. • https://cert-portal.siemens.com/productcert/pdf/ssa-522654.pdf • CWE-345: Insufficient Verification of Data Authenticity •
CVE-2020-27846 – crewjam/saml: authentication bypass in saml authentication
https://notcve.org/view.php?id=CVE-2020-27846
A signature verification vulnerability exists in crewjam/saml. This flaw allows an attacker to bypass SAML Authentication. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. Se presenta una vulnerabilidad de verificación de firmas en crewjam/saml. Este fallo permite a un atacante omitir la autenticación SAML. • https://bugzilla.redhat.com/show_bug.cgi?id=1907670 https://github.com/crewjam/saml/security/advisories/GHSA-4hq8-gmxx-h6w9 https://grafana.com/blog/2020/12/17/grafana-6.7.5-7.2.3-and-7.3.6-released-with-important-security-fix-for-grafana-enterprise https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YUTKIRWT6TWU7DS6GF3EOANVQBFQZYI https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ICP3YRY2VUCNCF2VFUSK77ZMRIC77FEM https://mattermos • CWE-115: Misinterpretation of Input •
CVE-2018-1000602
https://notcve.org/view.php?id=CVE-2018-1000602
A session fixation vulnerability exists in Jenkins SAML Plugin 1.0.6 and earlier in SamlSecurityRealm.java that allows unauthorized attackers to impersonate another users if they can control the pre-authentication session. Existe una vulnerabilidad de fijación de sesión en el plugin Google Login en versiones 1.0.6 y anteriores para Jenkins en SamlSecurityRealm.java que permite que los atacantes no autorizados suplanten otro usuario si pueden controlar la sesión de preautenticación. • https://jenkins.io/security/advisory/2018-06-25/#SECURITY-916 • CWE-384: Session Fixation •