5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
6.8 Medium
AI Score
Confidence
High
0.006 Low
EPSS
Percentile
77.6%
The SAML 2.0 implementation in AdNovum nevisAuth 4.13.0.0 before 4.18.3.1, when using SAML POST-Binding, does not match all attributes of the X.509 certificate embedded in the assertion against the certificate from the identity provider (IdP), which allows remote attackers to inject arbitrary SAML assertions via a crafted certificate.
CPE | Name | Operator | Version |
---|---|---|---|
adnovum:nevisauth | adnovum nevisauth | le | 4.18.3.0 |
blog.csnc.ch/2015/09/saml-sp-authentication-bypass-vulnerability-in-nevisauth
packetstormsecurity.com/files/133628/nevisAuth-Authentication-Bypass.html
seclists.org/fulldisclosure/2015/Sep/87
www.csnc.ch/misc/files/advisories/CVE-2015-5372_AdNovum_nevisAuth_Authentication_Bypass.txt
www.securityfocus.com/archive/1/536508/100/0/threaded