Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2011-1411


Shibboleth OpenSAML library 2.4.x before 2.4.3 and 2.5.x before 2.5.1, and IdP before 2.3.2, allows remote attackers to forge messages and bypass authentication via an "XML Signature wrapping attack."


Published

2011-09-02T23:55:04.240

Last Modified

2025-04-11T00:51:21.963

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 5.8 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:P/I:P/A:N

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

8.6

Impact Score

4.9

Weaknesses
  • Type: Primary
    CWE-287

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application shibboleth opensaml 2.4.0 Yes
Application shibboleth opensaml 2.4.1 Yes
Application shibboleth opensaml 2.4.2 Yes
Application shibboleth opensaml 2.5.0 Yes
Application shibboleth shibboleth-identity-provider ≤ 2.3.1 Yes
Application shibboleth shibboleth-identity-provider 2.0.0 Yes
Application shibboleth shibboleth-identity-provider 2.1.0 Yes
Application shibboleth shibboleth-identity-provider 2.1.1 Yes
Application shibboleth shibboleth-identity-provider 2.1.2 Yes
Application shibboleth shibboleth-identity-provider 2.1.3 Yes
Application shibboleth shibboleth-identity-provider 2.1.4 Yes
Application shibboleth shibboleth-identity-provider 2.1.5 Yes
Application shibboleth shibboleth-identity-provider 2.2.0 Yes
Application shibboleth shibboleth-identity-provider 2.2.1 Yes
Application shibboleth shibboleth-identity-provider 2.3.0 Yes

References