CVE-2020-5425

Published Oct 31, 2020

Last updated 4 years ago

Overview

Description
Single Sign-On for Vmware Tanzu all versions prior to 1.11.3 ,1.12.x versions prior to 1.12.4 and 1.13.x prior to 1.13.1 are vulnerable to user impersonation attack.If two users are logged in to the SSO operator dashboard at the same time, with the same username, from two different identity providers, one can acquire the token of the other and thus operate with their permissions. Note: Foundation may be vulnerable only if: 1) The system zone is set up to use a SAML identity provider 2) There are internal users that have the same username as users in the external SAML provider 3) Those duplicate-named users have the scope to access the SSO operator dashboard 4) The vulnerability doesn't appear with LDAP because of chained authentication.
Source
security@pivotal.io
NVD status
Analyzed

Risk scores

CVSS 3.1

Type
Primary
Base score
7.9
Impact score
6
Exploitability score
1.3
Vector string
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:H
Severity
HIGH

CVSS 3.0

Type
Secondary
Base score
7.5
Impact score
6
Exploitability score
1
Vector string
CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:H/A:H
Severity
HIGH

CVSS 2.0

Type
Primary
Base score
4.6
Impact score
6.4
Exploitability score
3.9
Vector string
AV:N/AC:H/Au:S/C:P/I:P/A:P

Weaknesses

nvd@nist.gov
CWE-287
security@pivotal.io
CWE-287

Social media

Hype score
Not currently trending

Configurations