Lucene search

K
cve[email protected]CVE-2012-2351
HistoryOct 03, 2022 - 4:15 p.m.

CVE-2012-2351

2022-10-0316:15:35
CWE-16
CWE-284
CWE-287
web.nvd.nist.gov
32
cve-2012-2351
mahara
saml
auth/saml plugin
spoofing
vulnerability
nvd

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

6.8 Medium

AI Score

Confidence

Low

0.002 Low

EPSS

Percentile

61.7%

The default configuration of the auth/saml plugin in Mahara before 1.4.2 sets the “Match username attribute to Remote username” option to false, which allows remote SAML IdP servers to spoof users of other SAML IdP servers by using the same internal username.

Affected configurations

NVD
Node
debiandebian_linuxMatch6.0
Node
maharamaharaRange1.4.1
OR
maharamaharaMatch0.9.0
OR
maharamaharaMatch0.9.1
OR
maharamaharaMatch0.9.2
OR
maharamaharaMatch1.0.0
OR
maharamaharaMatch1.0.1
OR
maharamaharaMatch1.0.2
OR
maharamaharaMatch1.0.3
OR
maharamaharaMatch1.0.4
OR
maharamaharaMatch1.0.5
OR
maharamaharaMatch1.0.6
OR
maharamaharaMatch1.0.7
OR
maharamaharaMatch1.0.8
OR
maharamaharaMatch1.0.9
OR
maharamaharaMatch1.0.10
OR
maharamaharaMatch1.0.11
OR
maharamaharaMatch1.0.12
OR
maharamaharaMatch1.0.13
OR
maharamaharaMatch1.0.14
OR
maharamaharaMatch1.0.15
OR
maharamaharaMatch1.1
OR
maharamaharaMatch1.1.0
OR
maharamaharaMatch1.1.0alpha1
OR
maharamaharaMatch1.1.0alpha2
OR
maharamaharaMatch1.1.0alpha3
OR
maharamaharaMatch1.1.0beta1
OR
maharamaharaMatch1.1.0beta2
OR
maharamaharaMatch1.1.0beta3
OR
maharamaharaMatch1.1.0beta4
OR
maharamaharaMatch1.1.0rc1
OR
maharamaharaMatch1.1.0rc2
OR
maharamaharaMatch1.1.1
OR
maharamaharaMatch1.1.2
OR
maharamaharaMatch1.1.3
OR
maharamaharaMatch1.1.4
OR
maharamaharaMatch1.1.5
OR
maharamaharaMatch1.1.6
OR
maharamaharaMatch1.1.7
OR
maharamaharaMatch1.1.8
OR
maharamaharaMatch1.1.9
OR
maharamaharaMatch1.2.0
OR
maharamaharaMatch1.2.0alpha1
OR
maharamaharaMatch1.2.0alpha2
OR
maharamaharaMatch1.2.0alpha3
OR
maharamaharaMatch1.2.0beta1
OR
maharamaharaMatch1.2.0beta2
OR
maharamaharaMatch1.2.0beta3
OR
maharamaharaMatch1.2.0beta4
OR
maharamaharaMatch1.2.0rc1
OR
maharamaharaMatch1.2.1
OR
maharamaharaMatch1.2.2
OR
maharamaharaMatch1.2.3
OR
maharamaharaMatch1.2.4
OR
maharamaharaMatch1.2.5
OR
maharamaharaMatch1.2.6
OR
maharamaharaMatch1.3.0
OR
maharamaharaMatch1.3.0beta1
OR
maharamaharaMatch1.3.0beta2
OR
maharamaharaMatch1.3.0beta3
OR
maharamaharaMatch1.3.0beta4
OR
maharamaharaMatch1.3.0rc1
OR
maharamaharaMatch1.3.1
OR
maharamaharaMatch1.3.2
OR
maharamaharaMatch1.3.3
OR
maharamaharaMatch1.3.4
OR
maharamaharaMatch1.3.5
OR
maharamaharaMatch1.3.6
OR
maharamaharaMatch1.3.7
OR
maharamaharaMatch1.3.8
OR
maharamaharaMatch1.4rc1
OR
maharamaharaMatch1.4rc2
OR
maharamaharaMatch1.4rc3
OR
maharamaharaMatch1.4rc4
OR
maharamaharaMatch1.4.0

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

6.8 Medium

AI Score

Confidence

Low

0.002 Low

EPSS

Percentile

61.7%