Description
PySAML2 before 5.0.0 does not check that the signature in a SAML document is enveloped and thus signature wrapping is effective, i.e., it is affected by XML Signature Wrapping (XSW). The signature information and the node/object that is signed can be in different places and thus the signature verification will succeed, but the wrong data will be used. This specifically affects the verification of assertion that have been signed.
References (8)
Core 8
Core References
Patch, Third Party Advisory x_refsource_confirm
https://github.com/IdentityPython/pysaml2/commit/5e9d5acbcd8ae45c4e736ac521fd2df5b1c62e25
Patch, Third Party Advisory x_refsource_confirm
https://github.com/IdentityPython/pysaml2/commit/f27c7e7a7010f83380566a219fd6a290a00f2b6e
Release Notes, Third Party Advisory x_refsource_confirm
https://github.com/IdentityPython/pysaml2/releases/tag/v5.0.0
Release Notes, Third Party Advisory x_refsource_confirm
https://github.com/IdentityPython/pysaml2/releases
Product, Third Party Advisory x_refsource_misc
https://pypi.org/project/pysaml2/5.0.0/
Third Party Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/4245-1/
Third Party Advisory vendor-advisory
x_refsource_debian
https://www.debian.org/security/2020/dsa-4630
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2020/02/msg00025.html
Scores
CVSS v3
7.5
EPSS
0.0076
EPSS Percentile
73.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Details
CWE
CWE-347
Status
published
Products (9)
canonical/ubuntu_linux
16.04
canonical/ubuntu_linux
18.04
canonical/ubuntu_linux
19.04
canonical/ubuntu_linux
19.10
debian/debian_linux
8.0
debian/debian_linux
9.0
debian/debian_linux
10.0
pypi/pysaml2
0 - 5.0.0PyPI
pysaml2_project/pysaml2
< 5.0.0
Published
Jan 13, 2020
Tracked Since
Feb 18, 2026