MEDIUM · 5.0

CVE-2012-2351

The default configuration of the auth/saml plugin in Mahara before 1.4.2 sets the "Match username attribute to Remote username" option to false, which allows remote SAML IdP servers to spoof users of ...

Vulnerability Description

The default configuration of the auth/saml plugin in Mahara before 1.4.2 sets the "Match username attribute to Remote username" option to false, which allows remote SAML IdP servers to spoof users of other SAML IdP servers by using the same internal username.

CVSS Score

5.0

MEDIUM

AV:N/AC:L/Au:N/C:N/I:P/A:N
Confidentiality
NONE
Integrity
PARTIAL
Availability
NONE

Affected Products

VendorProductVersions
DebianDebian Linux6.0
MaharaMahara<= 1.4.1

Related Weaknesses (CWE)

References

FAQ

What is CVE-2012-2351?

CVE-2012-2351 is a vulnerability with a CVSS score of 5.0 (MEDIUM). The default configuration of the auth/saml plugin in Mahara before 1.4.2 sets the "Match username attribute to Remote username" option to false, which allows remote SAML IdP servers to spoof users of ...

How severe is CVE-2012-2351?

CVE-2012-2351 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2012-2351?

Check the references section above for vendor advisories and patch information. Affected products include: Debian Debian Linux, Mahara Mahara.