CVE-2015-1796:
Improper Certificate Validation in Shibboleth Identity Provider and OpenSAML
4.3
CVSS Score
Basic Information
CVE ID
GHSA ID
EPSS Score
0.38439%
CWE
Published
5/17/2022
Updated
1/27/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
AV:N/AC:M/Au:N/C:N/I:P/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.opensaml:opensaml | maven | <= 2.6.4 | 2.6.5 |
edu.internet2.middleware:shibboleth-identityprovider | maven | <= 2.4.3 | 2.4.4 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from PKIX trust engine implementations that: 1) Failed to require at least one trusted name match 2) Didn't implicitly trust the entityID itself. The core vulnerable path involves the credential validation
entry point (PKIXX509CredentialTrustEngine.validate()
) and the metadata-driven name resolution (MetadataPKIXValidationInfoResolver.resolve()
). These would appear in stack traces during certificate validation when processing SAML messages with KeyAuthority-trusted certificates lacking proper name constraints.