Duo Network Gateway 1.2.9 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: duo

Published: 2019-04-17T14:01:03

Updated: 2024-08-05T06:24:11.848Z

Reserved: 2018-02-22T00:00:00

Link: CVE-2018-7340

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2019-04-17T15:29:00.640

Modified: 2020-10-02T14:44:32.147

Link: CVE-2018-7340

cve-icon Redhat

No data.