CVE Vulnerabilities

CVE-2021-21238

Improper Verification of Cryptographic Signature

Published: Jan 21, 2021 | Modified: Nov 21, 2024
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
RedHat/V2
RedHat/V3
6.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

PySAML2 is a pure python implementation of SAML Version 2 Standard. PySAML2 before 6.5.0 has an improper verification of cryptographic signature vulnerability. All users of pysaml2 that need to validate signed SAML documents are impacted. The vulnerability is a variant of XML Signature wrapping because it did not validate the SAML document against an XML schema. This allowed invalid XML documents to be processed and such a document can trick pysaml2 with a wrapped signature. This is fixed in PySAML2 6.5.0.

Weakness

The product does not verify, or incorrectly verifies, the cryptographic signature for data.

Affected Software

NameVendorStart VersionEnd Version
Pysaml2Pysaml2_project*6.5.0 (excluding)
Python-pysaml2Ubuntubionic*
Python-pysaml2Ubuntuesm-infra/bionic*
Python-pysaml2Ubuntuesm-infra/focal*
Python-pysaml2Ubuntuesm-infra/xenial*
Python-pysaml2Ubuntufocal*
Python-pysaml2Ubuntugroovy*
Python-pysaml2Ubuntuhirsute*
Python-pysaml2Ubuntuimpish*
Python-pysaml2Ubuntujammy*
Python-pysaml2Ubuntukinetic*
Python-pysaml2Ubuntutrusty*
Python-pysaml2Ubuntuupstream*
Python-pysaml2Ubuntuxenial*

References