CVE-2017-1000433

pysaml2 version 4.4.0 and older accept any password when run with python optimizations enabled. This allows attackers to log in as any user without knowing their password.
References
Link Resource
https://github.com/rohe/pysaml2/issues/451 Patch Third Party Advisory VDB Entry
https://lists.debian.org/debian-lts-announce/2018/07/msg00000.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2021/02/msg00038.html Mailing List Third Party Advisory
https://security.gentoo.org/glsa/201801-11 Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:pysaml2_project:pysaml2:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2018-01-02 23:29

Updated : 2024-02-04 19:29


NVD link : CVE-2017-1000433

Mitre link : CVE-2017-1000433

CVE.ORG link : CVE-2017-1000433


JSON object : View

Products Affected

debian

  • debian_linux

pysaml2_project

  • pysaml2
CWE
CWE-287

Improper Authentication