Improper Certificate Validation Affecting org.opensaml:opensaml package, versions [2.0.0,2.6.2)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.08% (37th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JAVA-ORGOPENSAML-30140
  • published25 Dec 2016
  • disclosed25 Dec 2016
  • creditKaspar Brand

Introduced: 25 Dec 2016

CVE-2014-3603  (opens in a new tab)
CWE-297  (opens in a new tab)

How to fix?

Upgrade org.opensaml:opensaml to version 2.6.2 or higher.

Overview

org.opensaml:opensaml provides tools to support developers working with the Security Assertion Markup Language (SAML).

Affected versions of this package are vulnerable to Improper Certificate Validation. HttpResource and FileBackedHttpResource implementations in OpenSAML Java and Shibboleth IdP did not enable hostname verification when using TLS connections. Additionaly, OpenSAML Java makes use of Jakarta Commons HttpClient version 3.x, which does not perform verification of the server hostname against the server's X.508 certificate (CVE-2012-5783). This flaw can be exploited by a Man-in-the-middle (MITM) attack, where the attacker can spoof a valid certificate using a specially crafted subject.

CVSS Scores

version 3.1