Lucene search

K
ShibbolethService Provider*

6 matches found

CVE
CVE
added 2019/11/21 6:15 p.m.129 views

CVE-2019-19191

Shibboleth Service Provider (SP) 3.x before 3.1.0 shipped a spec file that calls chown on files in a directory controlled by the service user (the shibd account) after installation. This allows the user to escalate to root by pointing symlinks to files such as /etc/shadow.

7.8CVSS7.5AI score0.00172EPSS
CVE
CVE
added 2017/11/16 5:29 p.m.58 views

CVE-2017-16852

shibsp/metadata/DynamicMetadataProvider.cpp in the Dynamic MetadataProvider plugin in Shibboleth Service Provider before 2.6.1 fails to properly configure itself with the MetadataFilter plugins and does not perform critical security checks such as signature verification, enforcement of validity per...

8.1CVSS7.8AI score0.00315EPSS
CVE
CVE
added 2015/03/31 2:59 p.m.55 views

CVE-2015-2684

Shibboleth Service Provider (SP) before 2.5.4 allows remote authenticated users to cause a denial of service (crash) via a crafted SAML message.

4CVSS6AI score0.00455EPSS
CVE
CVE
added 2021/03/22 8:15 a.m.49 views

CVE-2021-28963

Shibboleth Service Provider before 3.2.1 allows content injection because template generation uses attacker-controlled parameters.

5.3CVSS5.3AI score0.00488EPSS
CVE
CVE
added 2021/04/27 4:15 a.m.45 views

CVE-2021-31826

Shibboleth Service Provider 3.x before 3.2.2 is prone to a NULL pointer dereference flaw involving the session recovery feature. The flaw is exploitable (for a daemon crash) on systems not using this feature if a crafted cookie is supplied.

7.5CVSS7.3AI score0.01478EPSS
CVE
CVE
added 2023/01/11 2:15 a.m.35 views

CVE-2023-22947

Insecure folder permissions in the Windows installation path of Shibboleth Service Provider (SP) before 3.4.1 allow an unprivileged local attacker to escalate privileges to SYSTEM via DLL planting in the service executable's folder. This occurs because the installation goes under C:\opt (rather tha...

7.3CVSS7.1AI score0.00021EPSS