First published: Tue Jan 10 2017(Updated: )
It was found that python-pysaml2 is vulnerable to an XML external entity attack. python-pysaml2 does not sanitize SAML XML requests or responses. References: <a href="http://seclists.org/oss-sec/2017/q1/50">http://seclists.org/oss-sec/2017/q1/50</a> <a href="https://bugs.debian.org/850716">https://bugs.debian.org/850716</a> Upstream bug: <a href="https://github.com/rohe/pysaml2/issues/366">https://github.com/rohe/pysaml2/issues/366</a> Proposed patch (! actually fixes <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED ERRATA - CVE-2016-10149 python-pysaml2: Entity expansion issue" href="show_bug.cgi?id=1415710">Bug 1415710</a>): <a href="https://github.com/rohe/pysaml2/pull/379">https://github.com/rohe/pysaml2/pull/379</a>
Credit: security@debian.org security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/pysaml2 | <4.5.0 | 4.5.0 |
Pysaml2 Project Pysaml2 | ||
debian/python-pysaml2 | <=6.5.1-1<=7.0.1-2<=7.5.0-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.