CVE-2017-11427: Python-saml allows manipulation of SAML data without invalidation of cryptographic signature
(updated )
OneLogin PythonSAML 2.3.0 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.
References
- duo.com/blog/duo-finds-saml-vulnerabilities-affecting-multiple-implementations
- github.com/SAML-Toolkits/python-saml
- github.com/SAML-Toolkits/python-saml/commit/fad881b4432febea69d70691dfed51c93f0de10f
- github.com/advisories/GHSA-j8j8-348v-wfm3
- github.com/pypa/advisory-database/tree/main/vulns/python-saml/PYSEC-2019-198.yaml
- nvd.nist.gov/vuln/detail/CVE-2017-11427
- www.kb.cert.org/vuls/id/475445
Detect and mitigate CVE-2017-11427 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →