First published: Tue Jan 10 2017(Updated: )
It was found that python-pysaml2 is vulnerable to an XML external entity attack. python-pysaml2 does not sanitize SAML XML requests or responses. References: <a href="http://seclists.org/oss-sec/2017/q1/50">http://seclists.org/oss-sec/2017/q1/50</a> <a href="https://bugs.debian.org/850716">https://bugs.debian.org/850716</a> Upstream bug: <a href="https://github.com/rohe/pysaml2/issues/366">https://github.com/rohe/pysaml2/issues/366</a> Proposed patch (! actually fixes <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED ERRATA - CVE-2016-10149 python-pysaml2: Entity expansion issue" href="show_bug.cgi?id=1415710">Bug 1415710</a>): <a href="https://github.com/rohe/pysaml2/pull/379">https://github.com/rohe/pysaml2/pull/379</a>
Credit: security@debian.org security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/python-pysaml2 | <=6.5.1-1<=7.0.1-2<=7.5.0-2 | |
pip/pysaml2 | <4.5.0 | 4.5.0 |
pysaml2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2016-10127 is considered high due to the potential for XML external entity attacks.
To fix CVE-2016-10127, update python-pysaml2 to a version later than 7.5.0 or 4.5.0 for the pip package.
CVE-2016-10127 affects python-pysaml2 versions up to and including 7.5.0 and the pip package pysaml2 versions below 4.5.0.
CVE-2016-10127 facilitates XML external entity attacks due to insufficient sanitization of SAML XML requests or responses.
Yes, CVE-2016-10127 is a concern for all users of python-pysaml2, particularly those processing external XML data.