Lucene search

K
cveRedhatCVE-2014-3603
HistoryApr 04, 2019 - 2:29 p.m.

CVE-2014-3603

2019-04-0414:29:00
CWE-297
redhat
web.nvd.nist.gov
69
cve-2014-3603
shibboleth identity provider
opensaml java
ssl
man-in-the-middle attack
x.509 certificate

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

5.9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

AI Score

5.7

Confidence

High

EPSS

0.001

Percentile

35.1%

The (1) HttpResource and (2) FileBackedHttpResource implementations in Shibboleth Identity Provider (IdP) before 2.4.1 and OpenSAML Java 2.6.2 do not verify that the server hostname matches a domain name in the subject’s Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

Affected configurations

Nvd
Vulners
Node
shibbolethidentity_providerRange<2.4.1
Node
shibbolethopensaml_javaRange<2.6.2
VendorProductVersionCPE
shibbolethidentity_provider*cpe:2.3:a:shibboleth:identity_provider:*:*:*:*:*:*:*:*
shibbolethopensaml_java*cpe:2.3:a:shibboleth:opensaml_java:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Identity Provider (IdP)",
    "vendor": "Shibboleth; OpenSAML Java",
    "versions": [
      {
        "status": "affected",
        "version": "< 2.4.1"
      }
    ]
  },
  {
    "product": "OpenSAML Java",
    "vendor": "Shibboleth; OpenSAML Java",
    "versions": [
      {
        "status": "affected",
        "version": "< 2.6.2"
      }
    ]
  }
]

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

5.9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

AI Score

5.7

Confidence

High

EPSS

0.001

Percentile

35.1%