CVE-2021-21238
Published: 21 January 2021
PySAML2 is a pure python implementation of SAML Version 2 Standard. PySAML2 before 6.5.0 has an improper verification of cryptographic signature vulnerability. All users of pysaml2 that need to validate signed SAML documents are impacted. The vulnerability is a variant of XML Signature wrapping because it did not validate the SAML document against an XML schema. This allowed invalid XML documents to be processed and such a document can trick pysaml2 with a wrapped signature. This is fixed in PySAML2 6.5.0.
Notes
Author | Note |
---|---|
mdeslaur | Fixing this requires the python-xmlschema package, which is only available on hirsute. Backporting this fix to stable releases is intrusive and may introduce regressions. |
Priority
Status
Package | Release | Status |
---|---|---|
python-pysaml2 Launchpad, Ubuntu, Debian |
bionic |
Needed
|
focal |
Needed
|
|
groovy |
Ignored
(end of life)
|
|
hirsute |
Ignored
(end of life)
|
|
impish |
Ignored
(end of life)
|
|
jammy |
Needed
|
|
kinetic |
Ignored
(end of life, was needed)
|
|
lunar |
Not vulnerable
(7.1.0-0ubuntu2)
|
|
mantic |
Not vulnerable
(7.1.0-0ubuntu2)
|
|
noble |
Not vulnerable
(7.1.0-0ubuntu2)
|
|
trusty |
Does not exist
|
|
upstream |
Released
(6.5.1-1)
|
|
xenial |
Needed
|
|
Patches: upstream: https://github.com/IdentityPython/pysaml2/commit/1d8fd268f5bf887480a403a7a5ef8f048157cc14 upstream: https://github.com/IdentityPython/pysaml2/commit/3b707723dcf1bf60677b424aac398c0c3557641d |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.5 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | High |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N |