6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
0.002 Low
EPSS
Percentile
57.7%
PySAML2 is a pure python implementation of SAML Version 2 Standard. PySAML2
before 6.5.0 has an improper verification of cryptographic signature
vulnerability. Users of pysaml2 that use the default CryptoBackendXmlSec1
backend and need to verify signed SAML documents are impacted. PySAML2 does
not ensure that a signed SAML document is correctly signed. The default
CryptoBackendXmlSec1 backend is using the xmlsec1 binary to verify the
signature of signed SAML documents, but by default xmlsec1 accepts any type
of key found within the given document. xmlsec1 needs to be configured
explicitly to only use only x509 certificates for the verification
process of the SAML document signature. This is fixed in PySAML2 6.5.0.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | python-pysaml2 | < 4.0.2-0ubuntu3.2 | UNKNOWN |
ubuntu | 20.04 | noarch | python-pysaml2 | < 4.9.0-0ubuntu3.1 | UNKNOWN |
ubuntu | 21.04 | noarch | python-pysaml2 | < 6.1.0-0ubuntu1.21.04.1 | UNKNOWN |
ubuntu | 21.10 | noarch | python-pysaml2 | < 6.1.0-0ubuntu2 | UNKNOWN |
ubuntu | 22.04 | noarch | python-pysaml2 | < 6.1.0-0ubuntu2 | UNKNOWN |
ubuntu | 16.04 | noarch | python-pysaml2 | < 3.0.0-3ubuntu1.16.04.4+esm1) Available with Ubuntu Pro or Ubuntu Pro (Infra-only | UNKNOWN |
github.com/IdentityPython/pysaml2/releases/tag/v6.5.0
github.com/IdentityPython/pysaml2/security/advisories/GHSA-5p3x-r448-pc62
launchpad.net/bugs/cve/CVE-2021-21239
nvd.nist.gov/vuln/detail/CVE-2021-21239
pypi.org/project/pysaml2
security-tracker.debian.org/tracker/CVE-2021-21239
ubuntu.com/security/notices/USN-5066-1
ubuntu.com/security/notices/USN-5066-2
www.aleksey.com/pipermail/xmlsec/2013/009717.html
www.cve.org/CVERecord?id=CVE-2021-21239
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
0.002 Low
EPSS
Percentile
57.7%