Vulnerability Description
OneLogin PythonSAML 2.3.0 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Onelogin | Pythonsaml | <= 2.3.0 |
Related Weaknesses (CWE)
References
- https://duo.com/blog/duo-finds-saml-vulnerabilities-affecting-multiple-implementExploitTechnical DescriptionThird Party Advisory
- https://www.kb.cert.org/vuls/id/475445Third Party AdvisoryUS Government Resource
- https://duo.com/blog/duo-finds-saml-vulnerabilities-affecting-multiple-implementExploitTechnical DescriptionThird Party Advisory
- https://www.kb.cert.org/vuls/id/475445Third Party AdvisoryUS Government Resource
FAQ
What is CVE-2017-11427?
CVE-2017-11427 is a vulnerability with a CVSS score of 7.7 (HIGH). OneLogin PythonSAML 2.3.0 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without ...
How severe is CVE-2017-11427?
CVE-2017-11427 has been rated HIGH with a CVSS base score of 7.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-11427?
Check the references section above for vendor advisories and patch information. Affected products include: Onelogin Pythonsaml.