7.5.0
11 years ago
1 years ago
Known vulnerabilities in the pysaml2 package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
pysaml2 is a Python implementation of SAML Version 2 Standard. Affected versions of this package are vulnerable to XML External Entity (XXE) Injection allowing remote attackers to read arbitrary files via a crafted SAML XML request or response. NOTE: This vulnerability has also been identified as: CVE-2016-10127 How to fix XML External Entity (XXE) Injection? Upgrade | [,4.5.0) |
pysaml2 is a Python implementation of SAML Version 2 Standard. Affected versions of this package are vulnerable to Insecure Defaults. It does not ensure that a signed SAML document is correctly signed. The default How to fix Insecure Defaults? Upgrade | [,6.5.0) |
pysaml2 is a Python implementation of SAML Version 2 Standard. Affected versions of this package are vulnerable to Improper Validation. By default, the SAML document is not validated against an XML schema. This allows invalid XML documents to trick the verification process, by presenting elements with a valid signature inside elements whose content has been malformed. The verification is offloaded to How to fix Improper Validation? Upgrade | [,6.5.0) |
pysaml2 is a Python implementation of SAML Version 2 Standard. Affected versions of this package are vulnerable to XML Signature Wrapping. It does not check that the signature in a SAML document is enveloped and thus signature wrapping is effective. The signature information and the node/object that is signed can be in different places and thus the signature verification will succeed, but the wrong data will be used. This specifically affects the verification of assertion that have been signed. How to fix XML Signature Wrapping? Upgrade | [,5.0.0) |
Affected versions of this package are vulnerable to weak encryption due to reusage of the initialization vector across encryptions in the IDP server. How to fix Weak Encryption? Upgrade | [,4.6.0) |
Affected versions of the package are vulnerable to Access Restriction Bypass. How to fix Access Restriction Bypass? Upgrade | [,4.5.0) |
via a crafted SAML XML request or response. | [,4.5.0) |
Affected versions of this package are vulnerable to Access Restriction Bypass | [,2.3.0) |