CVE-2017-11430
moderate-risk
Published 2019-04-17
OmniAuth OmnitAuth-SAML 1.9.0 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.
Do I need to act?
-
0.44% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.7/10
High
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (4)
Third Party Advisory
https://www.kb.cert.org/vuls/id/475445
Third Party Advisory
https://www.kb.cert.org/vuls/id/475445
34
/ 100
moderate-risk
Severity
27/34 · High
Exploitability
2/34 · Minimal
Exposure
5/34 · Minimal