| Vulnerability Name: | CVE-2020-5407 (CCN-181939) | ||||||||||||
| Assigned: | 2020-05-07 | ||||||||||||
| Published: | 2020-05-07 | ||||||||||||
| Updated: | 2021-06-14 | ||||||||||||
| Summary: | Spring Security versions 5.2.x prior to 5.2.4 and 5.3.x prior to 5.3.2 contain a signature wrapping vulnerability during SAML response validation. When using the spring-security-saml2-service-provider component, a malicious user can carefully modify an otherwise valid SAML response and append an arbitrary assertion that Spring Security will accept as valid. | ||||||||||||
| CVSS v3 Severity: | 8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) 7.7 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
| ||||||||||||
| CVSS v2 Severity: | 6.5 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P)
| ||||||||||||
| Vulnerability Type: | CWE-347 | ||||||||||||
| Vulnerability Consequences: | Bypass Security | ||||||||||||
| References: | Source: MITRE Type: CNA CVE-2020-5407 Source: XF Type: UNKNOWN spring-cve20205407-sec-bypass(181939) Source: MLIST Type: Third Party Advisory [servicemix-issues] 20200514 [jira] [Created] (SM-4384) Create OSGi bundles for spring-security 5.3.2.RELEASE + 5.1.10.RELEASE Source: MLIST Type: UNKNOWN [geode-dev] 20200521 Proposal to backport GEODE-8167 Source: MLIST Type: UNKNOWN [geode-dev] 20200521 Re: Proposal to backport GEODE-8167 Source: CCN Type: Spring Web site Spring makes Java simple.modern.productive.reactive.cloud-read Source: CCN Type: VMware Tanzu Web site CVE-2020-5407: Signature Wrapping Vulnerability with spring-security-saml2-service-provider Source: CONFIRM Type: Vendor Advisory https://tanzu.vmware.com/security/cve-2020-5407 Source: CCN Type: IBM Security Bulletin 6410788 (Data Risk Manager) IBM Data Risk Manager is affected by multiple vulnerabilities Source: MISC Type: UNKNOWN https://www.oracle.com/security-alerts/cpuApr2021.html Source: MISC Type: UNKNOWN https://www.oracle.com/security-alerts/cpujan2021.html Source: MISC Type: UNKNOWN https://www.oracle.com/security-alerts/cpuoct2020.html | ||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
| BACK | |||||||||||||