First published: Wed May 13 2020(Updated: )
Spring Security versions 5.2.x prior to 5.2.4 and 5.3.x prior to 5.3.2 contain a signature wrapping vulnerability during SAML response validation. When using the spring-security-saml2-service-provider component, a malicious user can carefully modify an otherwise valid SAML response and append an arbitrary assertion that Spring Security will accept as valid.
Credit: security@pivotal.io
Affected Software | Affected Version | How to fix |
---|---|---|
Pivotal Software Spring Security | >=5.2.0<5.2.4 | |
Pivotal Software Spring Security | >=5.3.0<5.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2020-5407.
The severity of CVE-2020-5407 is high with a CVSS score of 8.8.
Spring Security versions 5.2.x prior to 5.2.4 and 5.3.x prior to 5.3.2 are affected by CVE-2020-5407.
CVE-2020-5407 is a signature wrapping vulnerability during SAML response validation in Spring Security versions 5.2.x prior to 5.2.4 and 5.3.x prior to 5.3.2.
To fix CVE-2020-5407, update Spring Security to version 5.2.4 or 5.3.2 or later.