CVE Vulnerabilities

CVE-2020-5390

Improper Verification of Cryptographic Signature

Published: Jan 13, 2020 | Modified: Nov 21, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:P/A:N
RedHat/V2
RedHat/V3
7.5 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

PySAML2 before 5.0.0 does not check that the signature in a SAML document is enveloped and thus signature wrapping is effective, i.e., it is affected by XML Signature Wrapping (XSW). The signature information and the node/object that is signed can be in different places and thus the signature verification will succeed, but the wrong data will be used. This specifically affects the verification of assertion that have been signed.

Weakness

The product does not verify, or incorrectly verifies, the cryptographic signature for data.

Affected Software

NameVendorStart VersionEnd Version
Pysaml2Pysaml2_project*5.0.0 (excluding)
Python-pysaml2Ubuntubionic*
Python-pysaml2Ubuntudevel*
Python-pysaml2Ubuntudisco*
Python-pysaml2Ubuntueoan*
Python-pysaml2Ubuntuesm-infra/bionic*
Python-pysaml2Ubuntuesm-infra/xenial*
Python-pysaml2Ubuntutrusty*
Python-pysaml2Ubuntuxenial*

References