First published: Tue Dec 15 2020(Updated: )
A signature verification vulnerability exists in crewjam/saml. This flaw allows an attacker to bypass SAML Authentication. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Grafana Grafana | <6.7.5 | |
Grafana Grafana | >=7.0.0<7.2.3 | |
Grafana Grafana | >=7.3.0<7.3.6 | |
Saml Project Saml | <0.4.3 | |
Redhat Openshift Container Platform | =3.11 | |
Redhat Openshift Container Platform | =4.0 | |
Redhat Openshift Service Mesh | =2.0 | |
Redhat Enterprise Linux | =8.0 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 | |
redhat/grafana | <7.3.6 | 7.3.6 |
redhat/grafana | <7.2.3 | 7.2.3 |
redhat/grafana | <6.7.5 | 6.7.5 |
redhat/github.com/crewjam/saml | <0.4.3 | 0.4.3 |
redhat/grafana | <0:7.3.6-2.el8 | 0:7.3.6-2.el8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-27846 is a signature verification vulnerability in crewjam/saml that allows bypassing of SAML Authentication.
CVE-2020-27846 has a severity value of 9, which is considered critical.
CVE-2020-27846 can lead to confidentiality, integrity, and system availability issues in the affected software.
The affected software versions include grafana 0:7.3.6-2.el8, 7.3.6, 7.2.3, 6.7.5, and github.com/crewjam/saml 0.4.3.
To fix CVE-2020-27846, update the affected software to the recommended versions: grafana 7.3.6-2.el8, 7.3.6, 7.2.3, 6.7.5, and github.com/crewjam/saml 0.4.3.