First published: Mon Mar 22 2021(Updated: )
Shibboleth Service Provider before 3.2.1 allows content injection because template generation uses attacker-controlled parameters.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Shibboleth Service Provider | <3.2.1 | |
Debian Debian Linux | =10.0 |
https://git.shibboleth.net/view/?p=cpp-sp.git;a=commit;h=d1dbebfadc1bdb824fea63843c4c38fa69e54379
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-28963 is a vulnerability in the Shibboleth Service Provider before version 3.2.1 that allows content injection due to template generation using attacker-controlled parameters.
The severity of CVE-2021-28963 is medium with a CVSS score of 5.3.
CVE-2021-28963 affects Shibboleth Service Provider versions up to 3.2.1, allowing content injection through the use of attacker-controlled parameters in template generation.
CVE-2021-28963 impacts Debian Linux version 10.0.
Yes, the fix for CVE-2021-28963 is available with the release of Shibboleth Service Provider version 3.2.1.