pysaml2 version in global requirements must be updated to 4.5.0
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
OpenStack Global Requirements |
Fix Released
|
Undecided
|
Matthew Thode | ||
OpenStack Identity (keystone) |
Fix Released
|
Low
|
Matthew Thode |
Bug Description
As per security vulnerability CVE-2016-10149, XML External Entity (XXE) vulnerability in PySAML2 4.4.0 and earlier allows remote attackers to read arbitrary files via a crafted SAML XML request or response and it has a CVSS v3 Base Score of 7.5.
The above vulnerability has been fixed in version 4.5.0 as per https:/
https:/
pysaml2>
https:/
pysaml2===4.0.2
The version of pysaml2 supported for OpenStack should be updated such that OpenStack deployments are not vulnerable to the above mentioned CVE.
pysaml2 is used by OpenStack Keystone for identity Federation. This bug in itself is not a security vulnerability but not fixing this bug causes OpenStack deployments to be vulnerable.
CVE References
Changed in keystone: | |
status: | Confirmed → Fix Committed |
assignee: | nobody → Matthew Thode (prometheanfire) |
milestone: | none → rocky-1 |
Changed in openstack-requirements: | |
status: | New → Fix Released |
assignee: | nobody → Matthew Thode (prometheanfire) |
Changed in keystone: | |
status: | Fix Committed → Fix Released |
So... you're saying that Keystone allows untrusted users to pass crafted SAML XML requests or responses through routines in PySAML2?