Improper Verification of Cryptographic Signature in PySAML2
High severity
GitHub Reviewed
Published
May 6, 2020
to the GitHub Advisory Database
•
Updated Oct 23, 2024
Description
Published by the National Vulnerability Database
Jan 13, 2020
Reviewed
May 6, 2020
Published to the GitHub Advisory Database
May 6, 2020
Last updated
Oct 23, 2024
PySAML2 before 5.0.0 does not check that the signature in a SAML document is enveloped and thus signature wrapping is effective, i.e., it is affected by XML Signature Wrapping (XSW). The signature information and the node/object that is signed can be in different places and thus the signature verification will succeed, but the wrong data will be used. This specifically affects the verification of assertions that have been signed.
References