First published: Thu Mar 21 2013(Updated: )
CA SiteMinder Federation (FSS) 12.5, 12.0, and r6; Federation (Standalone) 12.1 and 12.0; Agent for SharePoint 2010; and SiteMinder for Secure Proxy Server 6.0, 12.0, and 12.5 does not properly verify XML signatures for SAML statements, which allows remote attackers to spoof other users and gain privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Siteminder Agent For SharePoint 2010 | ||
CA SSO / SiteMinder Federation | ||
CA SSO / SiteMinder Federation | =standalone | |
Broadcom CA SiteMinder Federation 12.1 | =standalone | |
CA SiteMinder | ||
CA SiteMinder | ||
CA SiteMinder for Secure Proxy Server | ||
CA SiteMinder | ||
CA SiteMinder |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2279 has a critical severity rating as it allows attackers to spoof users through improper verification of XML signatures in SAML statements.
To fix CVE-2013-2279, update to the latest version of CA SiteMinder Federation or the affected agent products that implement proper XML signature verification.
CVE-2013-2279 affects CA SiteMinder Federation versions 12.5, 12.0, 12.1, and r6, as well as SharePoint 2010 Agent and Secure Proxy Server versions 6.0, 12.0, and 12.5.
CVE-2013-2279 allows remote attackers to impersonate users, potentially leading to unauthorized access to sensitive information.
There is no official workaround for CVE-2013-2279; the recommended action is to apply the security updates provided by the vendor.