Vulnerability CVE-2013-6440


Published: 2014-02-14

Description:
The (1) BasicParserPool, (2) StaticBasicParserPool, (3) XML Decrypter, and (4) SAML Decrypter in Shibboleth OpenSAML-Java before 2.6.1 set the expandEntityReferences property to true, which allows remote attackers to conduct XML external entity (XXE) attacks via a crafted XML DOCTYPE declaration.

See advisories in our WLB2 database:
Topic
Author
Date
High
OpenSAML Java ParserPool and Decrypter Vulnerable To XML Attacks
David Illsley
15.02.2014

Type:

CWE-200

(Information Exposure)

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Shibboleth -> Opensaml 
Internet2 -> Opensaml 

 References:
https://bugzilla.redhat.com/show_bug.cgi?id=1043332
http://shibboleth.net/community/advisories/secadv_20131213.txt
http://rhn.redhat.com/errata/RHSA-2014-0172.html
http://rhn.redhat.com/errata/RHSA-2014-0171.html
http://rhn.redhat.com/errata/RHSA-2014-0170.html
http://blog.sendsafely.com/post/69590974866/web-based-single-sign-on-and-the-dangers-of-saml-xml

Copyright 2024, cxsecurity.com

 

Back to Top