ALT-PU-2018-3721-1
Package python-module-pysaml2 updated to version 4.6.5-alt1 for branch sisyphus in task 218129.
Closed vulnerabilities
Published: 2017-03-24
Modified: 2025-04-20
Modified: 2025-04-20
CVE-2016-10149
XML External Entity (XXE) vulnerability in PySAML2 4.4.0 and earlier allows remote attackers to read arbitrary files via a crafted SAML XML request or response.
Severity: MEDIUM (5.0)Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Severity: HIGH (7.5)Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
References:
- http://www.debian.org/security/2017/dsa-3759
- http://www.openwall.com/lists/oss-security/2017/01/19/5
- http://www.securityfocus.com/bid/97692
- https://access.redhat.com/errata/RHSA-2017:0936
- https://access.redhat.com/errata/RHSA-2017:0937
- https://access.redhat.com/errata/RHSA-2017:0938
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850716
- https://github.com/rohe/pysaml2/commit/6e09a25d9b4b7aa7a506853210a9a14100b8bc9b
- https://github.com/rohe/pysaml2/issues/366
- https://github.com/rohe/pysaml2/pull/379
- http://www.debian.org/security/2017/dsa-3759
- http://www.openwall.com/lists/oss-security/2017/01/19/5
- http://www.securityfocus.com/bid/97692
- https://access.redhat.com/errata/RHSA-2017:0936
- https://access.redhat.com/errata/RHSA-2017:0937
- https://access.redhat.com/errata/RHSA-2017:0938
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850716
- https://github.com/rohe/pysaml2/commit/6e09a25d9b4b7aa7a506853210a9a14100b8bc9b
- https://github.com/rohe/pysaml2/issues/366
- https://github.com/rohe/pysaml2/pull/379
Published: 2017-11-17
Modified: 2025-04-20
Modified: 2025-04-20
CVE-2017-1000246
Python package pysaml2 version 4.4.0 and earlier reuses the initialization vector across encryptions in the IDP server, resulting in weak encryption of data.
Severity: MEDIUM (5.0)Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Severity: MEDIUM (5.3)Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
References:
Published: 2018-01-02
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2017-1000433
pysaml2 version 4.4.0 and older accept any password when run with python optimizations enabled. This allows attackers to log in as any user without knowing their password.
Severity: MEDIUM (6.8)Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Severity: HIGH (8.1)Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
References:
- https://github.com/rohe/pysaml2/issues/451
- https://lists.debian.org/debian-lts-announce/2018/07/msg00000.html
- https://lists.debian.org/debian-lts-announce/2021/02/msg00038.html
- https://security.gentoo.org/glsa/201801-11
- https://github.com/rohe/pysaml2/issues/451
- https://lists.debian.org/debian-lts-announce/2018/07/msg00000.html
- https://lists.debian.org/debian-lts-announce/2021/02/msg00038.html
- https://security.gentoo.org/glsa/201801-11
Published: 2018-07-13
Modified: 2024-10-22
Modified: 2024-10-22
GHSA-924m-4pmx-c67h
pysaml2 Improper Authentication vulnerability
Severity: CRITICAL (9.2)Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity: CRITICAL (9.2)Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
References:
- https://nvd.nist.gov/vuln/detail/CVE-2017-1000433
- https://github.com/rohe/pysaml2/issues/451
- https://github.com/IdentityPython/pysaml2/pull/454
- https://github.com/IdentityPython/pysaml2/commit/6312a41e037954850867f29d329e5007df1424a5
- https://github.com/advisories/GHSA-924m-4pmx-c67h
- https://github.com/pypa/advisory-database/tree/main/vulns/pysaml2/PYSEC-2018-48.yaml
- https://github.com/rohe/pysaml2
- https://lists.debian.org/debian-lts-announce/2018/07/msg00000.html
- https://lists.debian.org/debian-lts-announce/2021/02/msg00038.html
- https://security.gentoo.org/glsa/201801-11
Published: 2018-07-16
Modified: 2024-10-22
Modified: 2024-10-22
GHSA-c2vx-49jm-h3f6
Pysaml2 does not sanitize XML responses
Severity: HIGH (8.7)Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Severity: HIGH (8.7)Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
References:
- https://nvd.nist.gov/vuln/detail/CVE-2016-10149
- https://github.com/rohe/pysaml2/issues/366
- https://github.com/rohe/pysaml2/pull/379
- https://github.com/rohe/pysaml2/commit/6e09a25d9b4b7aa7a506853210a9a14100b8bc9b
- https://access.redhat.com/errata/RHSA-2017:0936
- https://access.redhat.com/errata/RHSA-2017:0937
- https://access.redhat.com/errata/RHSA-2017:0938
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850716
- https://github.com/advisories/GHSA-c2vx-49jm-h3f6
- https://github.com/pypa/advisory-database/tree/main/vulns/pysaml2/PYSEC-2017-25.yaml
- https://github.com/rohe/pysaml2
- http://www.debian.org/security/2017/dsa-3759
- http://www.openwall.com/lists/oss-security/2017/01/19/5
Published: 2018-07-16
Modified: 2024-10-14
Modified: 2024-10-14
GHSA-cq94-qf6q-mf2h
Pysaml2 improperly initializes encryption vector
Severity: MEDIUM (6.3)Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Severity: MEDIUM (6.3)Vector: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
References:
- https://nvd.nist.gov/vuln/detail/CVE-2017-1000246
- https://github.com/rohe/pysaml2/issues/417
- https://github.com/IdentityPython/pysaml2/pull/519/commits/7323f5c20efb59424d853c822e7a26d1aa3e84aa
- https://github.com/pypa/advisory-database/tree/main/vulns/pysaml2/PYSEC-2017-26.yaml
- https://github.com/rohe/pysaml2
