Source: python-pysaml2
Version: 2.0.0-1
Severity: important
Tags: patch security upstream
Forwarded: https://github.com/rohe/pysaml2/issues/451

Hi,

the following vulnerability was published for python-pysaml2.

CVE-2017-1000433[0]:
| pysaml2 version 4.4.0 and older accept any password when run with
| python optimizations enabled. This allows attackers to log in as any
| user without knowing their password.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-1000433
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000433
[1] https://github.com/rohe/pysaml2/issues/451
[2] 
https://github.com/rohe/pysaml2/commit/6312a41e037954850867f29d329e5007df1424a5

Regards,
Salvatore

Reply via email to