Spring Security versions 5.2.x prior to 5.2.4 and 5.3.x prior to 5.3.2 contain a signature wrapping vulnerability during SAML response validation. When using the spring-security-saml2-service-provider component, a malicious user can carefully modify an otherwise valid SAML response and append an arbitrary assertion that Spring Security will accept as valid.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-0457 | Spring Security versions 5.2.x prior to 5.2.4 and 5.3.x prior to 5.3.2 contain a signature wrapping vulnerability during SAML response validation. When using the spring-security-saml2-service-provider component, a malicious user can carefully modify an otherwise valid SAML response and append an arbitrary assertion that Spring Security will accept as valid. |
Github GHSA |
GHSA-48rw-j489-928m | Signature wrapping vulnerability in Spring Security |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: pivotal
Published:
Updated: 2024-09-16T23:56:17.066Z
Reserved: 2020-01-03T00:00:00.000Z
Link: CVE-2020-5407
No data.
Status : Modified
Published: 2020-05-13T17:15:11.967
Modified: 2024-11-21T05:34:06.070
Link: CVE-2020-5407
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA