Directory Traversal was discovered in University of Cambridge mod_ucam_webauth before 2.0.2. The key identification field ("kid") of the IdP's HTTP response message ("WLS-Response") can be manipulated by an attacker. The "kid" field is not signed like the rest of the message, and manipulation is therefore trivial. The "kid" field should only ever represent an integer. However, it is possible to provide any string value. An attacker could use this to their advantage to force the application agent to load the RSA public key required for message integrity checking from an unintended location.
References
Link Resource
https://doi.org/10.1007/978-3-030-03251-7_1 Permissions Required Third Party Advisory
https://github.com/grymer/CVE Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2019-05-13T15:44:06

Updated: 2019-05-13T15:44:06

Reserved: 2019-05-01T00:00:00


Link: CVE-2015-9287

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2019-05-13T16:29:00.350

Modified: 2019-05-20T13:25:51.723


Link: CVE-2015-9287

JSON object: View

cve-icon Redhat Information

No data.

CWE