PySAML2: Security bypass — GLSA 201801-11

A vulnerability in PySAML2 might allow remote attackers to bypass authentication.

Affected packages

dev-python/pysaml2 on all architectures
Affected versions < 4.0.2-r3
< 4.5.0
Unaffected versions >= 4.0.2-r3
>= 4.5.0

Background

PySAML2 is a pure python implementation of SAML2

Description

It was found that the PySAML2 relies on an assert statement to check the user’s password. A python optimizations might remove this assertion.

Impact

A remote attacker could bypass security restrictions and access any application which is using PySAML2 for authentication.

Workaround

Disable python optimizations.

Resolution

All PySAML2 4.0 users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-python/pysaml2-4.0.2-r3"
 

All PySAML2 4.5 users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-python/pysaml2-4.5.0"
 

References

Release date
January 11, 2018

Latest revision
January 12, 2018: 2

Severity
normal

Exploitable
remote

Bugzilla entries