Spring Security versions 5.2.x prior to 5.2.4 and 5.3.x prior to 5.3.2 contain a signature wrapping vulnerability during SAML response validation. When using the spring-security-saml2-service-provider component, a malicious user can carefully modify an otherwise valid SAML response and append an arbitrary assertion that Spring Security will accept as valid.
The product does not verify, or incorrectly verifies, the cryptographic signature for data.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Spring_security | Pivotal_software | 5.2.0 (including) | 5.2.4 (excluding) |
Spring_security | Pivotal_software | 5.3.0 (including) | 5.3.2 (excluding) |
Libspring-security-2.0-java | Ubuntu | precise | * |
Libspring-security-2.0-java | Ubuntu | trusty | * |