First published: Tue Oct 09 2012(Updated: )
Apache Axis2 allows remote attackers to forge messages and bypass authentication via a SAML assertion that lacks a Signature element, aka a "Signature exclusion attack," a different vulnerability than CVE-2012-4418.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache HTTP Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-5351 has a high severity rating due to its potential to allow remote attackers to bypass authentication.
To fix CVE-2012-5351, ensure that your Apache Axis2 is updated to a version that addresses this vulnerability.
CVE-2012-5351 allows attackers to forge messages, which can lead to unauthorized access and data exposure.
CVE-2012-5351 is related to CVE-2012-4418 but addresses a different aspect of SAML assertions.
CVE-2012-5351 affects all versions of Apache Axis2 prior to the fixed version.