An issue was discovered in Hitachi ID Bravura Security Fabric 11.0.0 through 11.1.3, 12.0.0 through 12.0.2, and 12.1.0. When using federated identity management (authenticating via SAML through a third-party identity provider), an attacker can inject additional data into a signed SAML response being transmitted to the service provider (ID Bravura Security Fabric). The application successfully validates the signed values but uses the unsigned malicious values. An attacker with lower-privilege access to the application can inject the username of a high-privilege user to impersonate that user.
The product does not verify, or incorrectly verifies, the cryptographic signature for data.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Id_bravura_security_fabric | Hitachi | 11.0.0 (including) | 11.1.3 (including) |
Id_bravura_security_fabric | Hitachi | 12.0.0 (including) | 12.0.2 (including) |
Id_bravura_security_fabric | Hitachi | 12.1.0 (including) | 12.1.0 (including) |