SAML Assertion Exploit in Aviatrix Controller by Aviatrix
CVE-2020-13415
7.5HIGH
Summary
A security flaw in Aviatrix Controller versions up to 5.1 allows attackers to exploit signed SAML assertions. This vulnerability enables unauthorized connections using expired assertions or those from users lacking valid access. Such XML Signature Wrapping can breach security protocols, compromising the integrity of the identity services utilized by Aviatrix.
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved