CVE-2021-3196
Published Jun 9, 2021
Last updated 3 years ago
Overview
- Description
- An issue was discovered in Hitachi ID Bravura Security Fabric 11.0.0 through 11.1.3, 12.0.0 through 12.0.2, and 12.1.0. When using federated identity management (authenticating via SAML through a third-party identity provider), an attacker can inject additional data into a signed SAML response being transmitted to the service provider (ID Bravura Security Fabric). The application successfully validates the signed values but uses the unsigned malicious values. An attacker with lower-privilege access to the application can inject the username of a high-privilege user to impersonate that user.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 6.5
- Impact score
- 6.4
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-347
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:hitachi:id_bravura_security_fabric:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0833DD7B-9348-4D33-94C2-A232E3F6B2E3", "versionEndIncluding": "11.1.3", "versionStartIncluding": "11.0.0" }, { "criteria": "cpe:2.3:a:hitachi:id_bravura_security_fabric:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "253C33A7-DF3C-4175-8795-AAB1D70A6CE6", "versionEndIncluding": "12.0.2", "versionStartIncluding": "12.0.0" }, { "criteria": "cpe:2.3:a:hitachi:id_bravura_security_fabric:12.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8167BAD5-DEB4-4DCC-9D43-3B67124F4FED" } ], "operator": "OR" } ] } ]