IBM Tivoli Federated Identity Manager XML Signature Validation Bypass

medium Nessus Plugin ID 70126

Synopsis

The remote host has an application installed that is affected by a signature validation bypass vulnerability.

Description

The version of IBM Tivoli Federated Identity Manager installed on the remote Windows host is affected by a signature validation bypass vulnerability due to improper validation of XML signatures related to certain single sign-on protocols and token modules. A remote, unauthenticated attacker can exploit this, via a specially crafted message, to perform actions as another user.

Solution

Upgrade to Tivoli Federated Identity Manager 6.1.1.13 / 6.2.0.11 / 6.2.1.3 / 6.2.2.2 or later.

See Also

http://www.nessus.org/u?4c13e74e

Plugin Details

Severity: Medium

ID: 70126

File Name: tivoli_federated_identity_manager_swg21612612.nasl

Version: 1.7

Type: local

Agent: windows

Family: Windows

Published: 9/25/2013

Updated: 8/1/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 2.7

CVSS v2

Risk Factor: Medium

Base Score: 5.8

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N

Vulnerability Information

CPE: cpe:/a:ibm:tivoli_federated_identity_manager

Required KB Items: installed_sw/IBM Tivoli Federated Identity Manager

Exploit Ease: No known exploits are available

Patch Publication Date: 9/28/2012

Vulnerability Publication Date: 9/28/2012

Reference Information

CVE: CVE-2012-3314

BID: 55732