Vulnerability Description
Wizkunde SAMLBase may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wizkunde | Samlbase | < 1.4.2 |
Related Weaknesses (CWE)
References
- https://duo.com/blog/duo-finds-saml-vulnerabilities-affecting-multiple-implementExploitThird Party Advisory
- https://github.com/GoGentoOSS/SAMLBase/commit/482cdf8c090e0f1179073034ebcb609ac7PatchThird Party Advisory
- https://github.com/GoGentoOSS/SAMLBase/issues/3Issue TrackingPatchThird Party Advisory
- https://www.kb.cert.org/vuls/id/475445Third Party AdvisoryUS Government Resource
- https://duo.com/blog/duo-finds-saml-vulnerabilities-affecting-multiple-implementExploitThird Party Advisory
- https://github.com/GoGentoOSS/SAMLBase/commit/482cdf8c090e0f1179073034ebcb609ac7PatchThird Party Advisory
- https://github.com/GoGentoOSS/SAMLBase/issues/3Issue TrackingPatchThird Party Advisory
- https://www.kb.cert.org/vuls/id/475445Third Party AdvisoryUS Government Resource
FAQ
What is CVE-2018-5387?
CVE-2018-5387 is a vulnerability with a CVSS score of 7.5 (HIGH). Wizkunde SAMLBase may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cry...
How severe is CVE-2018-5387?
CVE-2018-5387 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-5387?
Check the references section above for vendor advisories and patch information. Affected products include: Wizkunde Samlbase.