|The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.|
OpenSAML Java: invalid trust by MetadataPKIX
Synthesis of the vulnerability
An attacker with a certificate provided by one of the Trust Anchors indicated in shibmd:KeyAuthority can impersonate the identity of an entity, in order to escalate his privileges on an application using OpenSAML Java.
Impacted software: Mule ESB, OpenSAML-J.
Severity of this computer vulnerability: 3/4.
Consequences of a hack: user access/rights.
Attacker's origin: user account.
Creation date: 26/02/2015.
Références of this announce: VIGILANCE-VUL-16270.
Description of the vulnerability
The OpenSAML Java product uses the MetadataPKIX trust engine.
However, MetadataPKIX accepts an X.509 credential when there is no Trusted Name available for an entityID. This case occurs when an entity has a RoleDescriptor KeyDescriptor containing no KeyName element. Editor's announce indicates the list of vulnerable configurations.
An attacker with a certificate provided by one of the Trust Anchors indicated in shibmd:KeyAuthority can therefore impersonate the identity of an entity, in order to escalate his privileges on an application using OpenSAML Java.
Full Vigil@nce bulletin... (Free trial)
Computer vulnerabilities tracking service
Vigil@nce provides system vulnerability alerts. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system. The technology watch team tracks security threats targeting the computer system. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system.