Description
When SAML authentication is enabled, Juniper Networks Mist Cloud UI might incorrectly handle child elements in SAML responses, allowing a remote attacker to modify a valid SAML response without invalidating its cryptographic signature to bypass SAML authentication security controls. This issue affects all Juniper Networks Mist Cloud UI versions prior to September 2 2020.
No analysis available yet.
Remediation
Vendor Solution
Mist Cloud UI has been updated on September 2 2020 to resolve this specific issue.
Vendor Workaround
No workarounds are required since the issue has been resolved in the Mist cloud UI.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-12539 | When SAML authentication is enabled, Juniper Networks Mist Cloud UI might incorrectly handle child elements in SAML responses, allowing a remote attacker to modify a valid SAML response without invalidating its cryptographic signature to bypass SAML authentication security controls. This issue affects all Juniper Networks Mist Cloud UI versions prior to September 2 2020. |
References
| Link | Providers |
|---|---|
| https://kb.juniper.net/JSA11072 |
|
History
Mon, 16 Sep 2024 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Juniper Networks Mist Cloud UI: SAML authentication attribute elements handling vulnerability. | Juniper Networks Mist Cloud UI: SAML authentication attribute elements handling vulnerability. |
Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2024-09-16T22:02:21.346Z
Reserved: 2019-11-04T00:00:00.000Z
Link: CVE-2020-1677
No data.
Status : Modified
Published: 2020-10-16T21:15:13.550
Modified: 2024-11-21T05:11:08.497
Link: CVE-2020-1677
No data.
OpenCVE Enrichment
No data.
EUVD