Lucene search

K
debianDebianDEBIAN:DLA-2577-1:3F007
HistoryFeb 26, 2021 - 5:05 a.m.

[SECURITY] [DLA 2577-1] python-pysaml2 security update

2021-02-2605:05:51
lists.debian.org
204

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.002 Low

EPSS

Percentile

57.7%


Debian LTS Advisory DLA-2577-1 [email protected]
https://www.debian.org/lts/security/ Abhijith PA
February 26, 2021 https://wiki.debian.org/LTS


Package : python-pysaml2
Version : 3.0.0-5+deb9u2
CVE ID : CVE-2017-1000433 CVE-2021-21239
Debian Bug : 886423 CVE-2021-21239

Several issues have been found in python-pysaml2, a pure python
implementation of SAML Version 2 Standard.

CVE-2017-1000433

 pysaml2 accept any password when run with python optimizations 
 enabled. This allows attackers to log in as any user without 
 knowing their password.

CVE-2021-21239

 pysaml2 has an improper verification of cryptographic signature
 vulnerability. Users of pysaml2 that use the default
 CryptoBackendXmlSec1 backend and need to verify signed SAML
 documents are impacted. PySAML2 does not ensure that a signed
 SAML document is correctly signed. The default
 CryptoBackendXmlSec1 backend is using the xmlsec1 binary to
 verify the signature of signed SAML documents, but by default
 xmlsec1 accepts any type of key found within the given document.
 xmlsec1 needs to be configured explicitly to only use only _x509
 certificates_ for the verification process of the SAML document signature.

For Debian 9 stretch, these problems have been fixed in version
3.0.0-5+deb9u2.

We recommend that you upgrade your python-pysaml2 packages.

For the detailed security status of python-pysaml2 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/python-pysaml2

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.002 Low

EPSS

Percentile

57.7%