6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
0.002 Low
EPSS
Percentile
57.7%
Debian LTS Advisory DLA-2577-1 [email protected]
https://www.debian.org/lts/security/ Abhijith PA
February 26, 2021 https://wiki.debian.org/LTS
Package : python-pysaml2
Version : 3.0.0-5+deb9u2
CVE ID : CVE-2017-1000433 CVE-2021-21239
Debian Bug : 886423 CVE-2021-21239
Several issues have been found in python-pysaml2, a pure python
implementation of SAML Version 2 Standard.
CVE-2017-1000433
pysaml2 accept any password when run with python optimizations
enabled. This allows attackers to log in as any user without
knowing their password.
CVE-2021-21239
pysaml2 has an improper verification of cryptographic signature
vulnerability. Users of pysaml2 that use the default
CryptoBackendXmlSec1 backend and need to verify signed SAML
documents are impacted. PySAML2 does not ensure that a signed
SAML document is correctly signed. The default
CryptoBackendXmlSec1 backend is using the xmlsec1 binary to
verify the signature of signed SAML documents, but by default
xmlsec1 accepts any type of key found within the given document.
xmlsec1 needs to be configured explicitly to only use only _x509
certificates_ for the verification process of the SAML document signature.
For Debian 9 stretch, these problems have been fixed in version
3.0.0-5+deb9u2.
We recommend that you upgrade your python-pysaml2 packages.
For the detailed security status of python-pysaml2 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/python-pysaml2
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 9 | all | python-pysaml2 | < 3.0.0-5+deb9u2 | python-pysaml2_3.0.0-5+deb9u2_all.deb |
Debian | 9 | all | python3-pysaml2 | < 3.0.0-5+deb9u2 | python3-pysaml2_3.0.0-5+deb9u2_all.deb |
Debian | 9 | all | python-pysaml2-doc | < 3.0.0-5+deb9u2 | python-pysaml2-doc_3.0.0-5+deb9u2_all.deb |
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
0.002 Low
EPSS
Percentile
57.7%