An issue was discovered in Hitachi ID Bravura Security Fabric 11.0.0 through 11.1.3, 12.0.0 through 12.0.2, and 12.1.0. When using federated identity management (authenticating via SAML through a third-party identity provider), an attacker can inject additional data into a signed SAML response being transmitted to the service provider (ID Bravura Security Fabric). The application successfully validates the signed values but uses the unsigned malicious values. An attacker with lower-privilege access to the application can inject the username of a high-privilege user to impersonate that user.
2021-06-09T15:15:08.797
2024-11-21T06:21:07.313
Modified
CVSSv3.1: 8.8 (HIGH)
AV:N/AC:L/Au:S/C:P/I:P/A:P
8.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | hitachi | id_bravura_security_fabric | ≤ 11.1.3 | Yes |
Application | hitachi | id_bravura_security_fabric | ≤ 12.0.2 | Yes |
Application | hitachi | id_bravura_security_fabric | 12.1.0 | Yes |