WCF/WIF SAML Token Authentication Bypass Vulnerability - CVE-2019-1006ID: oval:org.secpod.oval:def:57244 | Date: (C)2019-07-10 (M)2024-03-06 |
Class: VULNERABILITY | Family: windows |
An authentication bypass vulnerability exists in Windows Communication Foundation (WCF) and Windows Identity Foundation (WIF), allowing signing of SAML tokens with arbitrary symmetric keys. This vulnerability allows an attacker to impersonate another user, which can lead to elevation of privileges. The vulnerability exists in WCF, WIF 3.5 and above in .NET Framework, WIF 1.0 component in Windows, WIF Nuget package, and WIF implementation in SharePoint. An unauthenticated attacker can exploit this by signing a SAML token with any arbitrary symmetric key. This security update addresses the issue by ensuring all versions of WCF and WIF validate the key used to sign SAML tokens correctly.
Platform: |
Microsoft Windows Server |
Microsoft Windows 7 |
Microsoft Windows 8 |
Microsoft Windows 8.1 |
Microsoft Windows Server 2003 |
Microsoft Windows Server 2008 |
Microsoft Windows Server 2012 |
Microsoft Windows Server 2012 R2 |
Microsoft Windows Vista |
Microsoft Windows 10 |
Microsoft Windows Server 2008 R2 |
Microsoft Windows Server 2016 |
Microsoft Windows Server 2019 |
Microsoft Windows XP |
Product: |
Microsoft SharePoint Foundation 2010 |
Microsoft SharePoint Foundation 2013 |
Microsoft SharePoint Server 2013 |
Microsoft SharePoint Server 2016 |
Microsoft .NET Framework 2.0 |
Microsoft .NET Framework 3.0 |
Microsoft .NET Framework 3.5.1 |
Microsoft .NET Framework 4.5.2 |
Microsoft .NET Framework 4.6.2 |
Microsoft .NET Framework 4.6.1 |
Microsoft .NET Framework 4.6 |
Microsoft .NET Framework 3.5 |
Microsoft .NET Framework 4.7 |
Microsoft .NET Framework 4.7.1 |
Microsoft .NET Framework 4.7.2 |
Microsoft .NET Framework 4.8 |