Source: python-pysaml2
Version: 4.5.0-5
Severity: grave
Tags: security upstream
Justification: user security hole
Control: found -1 4.5.0-4

Hi,

The following vulnerability was published for python-pysaml2.

CVE-2020-5390[0]:
| PySAML2 before 5.0.0 does not check that the signature in a SAML
| document is enveloped and thus signature wrapping is effective, i.e.,
| it is affected by XML Signature Wrapping (XSW). The signature
| information and the node/object that is signed can be in different
| places and thus the signature verification will succeed, but the wrong
| data will be used. This specifically affects the verification of
| assertion that have been signed.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2020-5390
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5390
[1] 
https://github.com/IdentityPython/pysaml2/commit/5e9d5acbcd8ae45c4e736ac521fd2df5b1c62e25

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to