Source: python-pysaml2 Version: 2.0.0-1 Severity: important Tags: patch security upstream Forwarded: https://github.com/rohe/pysaml2/issues/451
Hi, the following vulnerability was published for python-pysaml2. CVE-2017-1000433[0]: | pysaml2 version 4.4.0 and older accept any password when run with | python optimizations enabled. This allows attackers to log in as any | user without knowing their password. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2017-1000433 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000433 [1] https://github.com/rohe/pysaml2/issues/451 [2] https://github.com/rohe/pysaml2/commit/6312a41e037954850867f29d329e5007df1424a5 Regards, Salvatore