// For flags

CVE-2020-5425

User Impersonation possible in Tanzu SSO

Severity Score

7.9
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Single Sign-On for Vmware Tanzu all versions prior to 1.11.3 ,1.12.x versions prior to 1.12.4 and 1.13.x prior to 1.13.1 are vulnerable to user impersonation attack.If two users are logged in to the SSO operator dashboard at the same time, with the same username, from two different identity providers, one can acquire the token of the other and thus operate with their permissions. Note: Foundation may be vulnerable only if: 1) The system zone is set up to use a SAML identity provider 2) There are internal users that have the same username as users in the external SAML provider 3) Those duplicate-named users have the scope to access the SSO operator dashboard 4) The vulnerability doesn't appear with LDAP because of chained authentication.

Single Sign-On para Vmware Tanzu todas las versiones anteriores a 1.11.3, versiones 1.12.x anteriores a 1.12.4 y versiones 1.13.x anteriores a 1.13.1, son vulnerables a un ataque de suplantación de identidad del usuario. Si dos usuarios inician sesión en el panel del operador SSO al mismo tiempo, con el mismo nombre de usuario, de dos proveedores de identidad diferentes, uno puede adquirir el token del otro y así operar con sus permisos. Nota: Foundation puede ser vulnerable solo si: 1) La zona del sistema está configurada para usar un proveedor de identidad SAML 2) Existen usuarios internos que tienen el mismo nombre de usuario que los usuarios del proveedor SAML externo 3) Esos usuarios con nombre duplicado tienen el alcance para acceder al panel del operador SSO 4) La vulnerabilidad no aparece con LDAP debido a la autenticación encadenada

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
High
Privileges Required
High
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
High
Authentication
Single
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-01-03 CVE Reserved
  • 2020-10-31 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-09-17 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-287: Improper Authentication
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Vmware
Search vendor "Vmware"
Single Sign-on For Tanzu
Search vendor "Vmware" for product "Single Sign-on For Tanzu"
< 1.11.3
Search vendor "Vmware" for product "Single Sign-on For Tanzu" and version " < 1.11.3"
-
Affected
Vmware
Search vendor "Vmware"
Single Sign-on For Tanzu
Search vendor "Vmware" for product "Single Sign-on For Tanzu"
>= 1.12.0 < 1.12.4
Search vendor "Vmware" for product "Single Sign-on For Tanzu" and version " >= 1.12.0 < 1.12.4"
-
Affected
Vmware
Search vendor "Vmware"
Single Sign-on For Tanzu
Search vendor "Vmware" for product "Single Sign-on For Tanzu"
>= 1.13.0 < 1.13.1
Search vendor "Vmware" for product "Single Sign-on For Tanzu" and version " >= 1.13.0 < 1.13.1"
-
Affected