X-Pack Security versions 6.2.0, 6.2.1, and 6.2.2 are vulnerable to a user impersonation attack via incorrect XML canonicalization and DOM traversal. An attacker might have been able to impersonate a legitimate user if the SAML Identity Provider allows for self registration with arbitrary identifiers and the attacker can register an account which an identifier that shares a suffix with a legitimate account. Both of those conditions must be true in order to exploit this flaw.
Advisories
Source ID Title
EUVD EUVD EUVD-2018-15610 X-Pack Security versions 6.2.0, 6.2.1, and 6.2.2 are vulnerable to a user impersonation attack via incorrect XML canonicalization and DOM traversal. An attacker might have been able to impersonate a legitimate user if the SAML Identity Provider allows for self registration with arbitrary identifiers and the attacker can register an account which an identifier that shares a suffix with a legitimate account. Both of those conditions must be true in order to exploit this flaw.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: elastic

Published:

Updated: 2024-08-05T04:57:23.752Z

Reserved: 2018-01-02T00:00:00

Link: CVE-2018-3822

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-03-30T20:29:00.490

Modified: 2024-11-21T04:06:06.207

Link: CVE-2018-3822

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.