Vulnerabilities > CVE-2016-10127 - XXE vulnerability in Pysaml2 Project Pysaml2
Attack vector
NETWORK Attack complexity
LOW Privileges required
LOW Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
PySAML2 allows remote attackers to conduct XML external entity (XXE) attacks via a crafted SAML XML request or response.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Common Weakness Enumeration (CWE)
Nessus
NASL family | Debian Local Security Checks |
NASL id | DEBIAN_DSA-3759.NASL |
description | Matias P. Brutti discovered that python-pysaml2, a Python implementation of the Security Assertion Markup Language 2.0, did not correctly sanitize the XML messages it handled. This allowed a remote attacker to perform XML External Entity attacks, leading to a wide range of exploits. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 96461 |
published | 2017-01-13 |
reporter | This script is Copyright (C) 2017-2018 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/96461 |
title | Debian DSA-3759-1 : python-pysaml2 - security update |
code |
|
References
- http://www.openwall.com/lists/oss-security/2017/01/19/5
- http://www.openwall.com/lists/oss-security/2017/01/19/5
- http://www.securityfocus.com/bid/95376
- http://www.securityfocus.com/bid/95376
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850716
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850716
- https://github.com/rohe/pysaml2/commit/6e09a25d9b4b7aa7a506853210a9a14100b8bc9b
- https://github.com/rohe/pysaml2/commit/6e09a25d9b4b7aa7a506853210a9a14100b8bc9b
- https://github.com/rohe/pysaml2/issues/366
- https://github.com/rohe/pysaml2/issues/366
- https://github.com/rohe/pysaml2/pull/379
- https://github.com/rohe/pysaml2/pull/379