CVE-2017-1000433

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2017-1000433
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-1000433.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2017-1000433
Aliases
Related
Published
2018-01-02T23:29:00Z
Modified
2024-09-11T04:07:13.256979Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

pysaml2 version 4.4.0 and older accept any password when run with python optimizations enabled. This allows attackers to log in as any user without knowing their password.

References

Affected packages

Debian:11 / python-pysaml2

Package

Name
python-pysaml2
Purl
pkg:deb/debian/python-pysaml2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.5.0-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / python-pysaml2

Package

Name
python-pysaml2
Purl
pkg:deb/debian/python-pysaml2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.5.0-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / python-pysaml2

Package

Name
python-pysaml2
Purl
pkg:deb/debian/python-pysaml2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.5.0-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/rohe/pysaml2

Affected ranges

Type
GIT
Repo
https://github.com/rohe/pysaml2
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

0.*

0.1
0.2
0.4
0.4.1
0.4.2

1.*

1.0.0
1.0.1

2.*

2.0.0
2.1.0
2.3.0
2.4.0

3.*

3.0.0

4.*

4.0.0

v1.*

v1.0.3

v2.*

v2.2.0

v3.*

v3.0.2

v4.*

v4.1.0
v4.2.0
v4.3.0
v4.4.0