ID |
CVE-2016-10127
|
Summary |
PySAML2 allows remote attackers to conduct XML external entity (XXE) attacks via a crafted SAML XML request or response. |
References |
|
Vulnerable Configurations |
|
CVSS |
Base: | 6.8 (as of 08-03-2017 - 01:07) |
Impact: | |
Exploitability: | |
|
CWE |
CWE-611 |
CAPEC |
-
XML External Entities Blowup
This attack takes advantage of the entity replacement property of XML where the value of the replacement is a URI. A well-crafted XML document could have the entity refer to a URI that consumes a large amount of resources to create a denial of service condition. This can cause the system to either freeze, crash, or execute arbitrary code depending on the URI.
|
Access |
Vector | Complexity | Authentication |
NETWORK |
MEDIUM |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
PARTIAL |
PARTIAL |
PARTIAL |
|
cvss-vector
via4
|
AV:N/AC:M/Au:N/C:P/I:P/A:P
|
refmap
via4
|
bid | 95376 | misc | | mlist | [oss-security] 20170119 Re: CVE request: python-pysaml2 XML external entity attack |
|
Last major update |
08-03-2017 - 01:07 |
Published |
03-03-2017 - 15:59 |
Last modified |
08-03-2017 - 01:07 |