CVE-2017-1000433

pysaml2 version 4.4.0 and older accept any password when run with python optimizations enabled. This allows attackers to log in as any user without knowing their password.
References
Link Resource
https://github.com/rohe/pysaml2/issues/451 Patch Third Party Advisory VDB Entry
https://lists.debian.org/debian-lts-announce/2018/07/msg00000.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2021/02/msg00038.html Mailing List Third Party Advisory
https://security.gentoo.org/glsa/201801-11 Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:pysaml2_project:pysaml2:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

04 Mar 2021, 21:16

Type Values Removed Values Added
References (MLIST) https://lists.debian.org/debian-lts-announce/2021/02/msg00038.html - (MLIST) https://lists.debian.org/debian-lts-announce/2021/02/msg00038.html - Mailing List, Third Party Advisory
CPE cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

26 Feb 2021, 07:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2021/02/msg00038.html -

Information

Published : 2018-01-02 23:29

Updated : 2023-12-10 12:15


NVD link : CVE-2017-1000433

Mitre link : CVE-2017-1000433

CVE.ORG link : CVE-2017-1000433


JSON object : View

Products Affected

pysaml2_project

  • pysaml2

debian

  • debian_linux
CWE
CWE-287

Improper Authentication