CVE-2020-5425
User Impersonation possible in Tanzu SSO
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Single Sign-On for Vmware Tanzu all versions prior to 1.11.3 ,1.12.x versions prior to 1.12.4 and 1.13.x prior to 1.13.1 are vulnerable to user impersonation attack.If two users are logged in to the SSO operator dashboard at the same time, with the same username, from two different identity providers, one can acquire the token of the other and thus operate with their permissions. Note: Foundation may be vulnerable only if: 1) The system zone is set up to use a SAML identity provider 2) There are internal users that have the same username as users in the external SAML provider 3) Those duplicate-named users have the scope to access the SSO operator dashboard 4) The vulnerability doesn't appear with LDAP because of chained authentication.
Single Sign-On para Vmware Tanzu todas las versiones anteriores a 1.11.3, versiones 1.12.x anteriores a 1.12.4 y versiones 1.13.x anteriores a 1.13.1, son vulnerables a un ataque de suplantación de identidad del usuario. Si dos usuarios inician sesión en el panel del operador SSO al mismo tiempo, con el mismo nombre de usuario, de dos proveedores de identidad diferentes, uno puede adquirir el token del otro y así operar con sus permisos. Nota: Foundation puede ser vulnerable solo si: 1) La zona del sistema está configurada para usar un proveedor de identidad SAML 2) Existen usuarios internos que tienen el mismo nombre de usuario que los usuarios del proveedor SAML externo 3) Esos usuarios con nombre duplicado tienen el alcance para acceder al panel del operador SSO 4) La vulnerabilidad no aparece con LDAP debido a la autenticación encadenada
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-01-03 CVE Reserved
- 2020-10-31 CVE Published
- 2023-03-08 EPSS Updated
- 2024-09-17 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-287: Improper Authentication
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://tanzu.vmware.com/security/cve-2020-5425 | 2020-11-17 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Vmware Search vendor "Vmware" | Single Sign-on For Tanzu Search vendor "Vmware" for product "Single Sign-on For Tanzu" | < 1.11.3 Search vendor "Vmware" for product "Single Sign-on For Tanzu" and version " < 1.11.3" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Single Sign-on For Tanzu Search vendor "Vmware" for product "Single Sign-on For Tanzu" | >= 1.12.0 < 1.12.4 Search vendor "Vmware" for product "Single Sign-on For Tanzu" and version " >= 1.12.0 < 1.12.4" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Single Sign-on For Tanzu Search vendor "Vmware" for product "Single Sign-on For Tanzu" | >= 1.13.0 < 1.13.1 Search vendor "Vmware" for product "Single Sign-on For Tanzu" and version " >= 1.13.0 < 1.13.1" | - |
Affected
|