Ubuntu update for lasso



Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2021-28091
CWE-ID CWE-269
Exploitation vector Network
Public exploit Public exploit code for vulnerability #1 is available.
Vulnerable software
Ubuntu
Operating systems & Components / Operating system

python3-lasso (Ubuntu package)
Operating systems & Components / Operating system package or component

liblasso3 (Ubuntu package)
Operating systems & Components / Operating system package or component

liblasso-perl (Ubuntu package)
Operating systems & Components / Operating system package or component

python-lasso (Ubuntu package)
Operating systems & Components / Operating system package or component

Vendor Canonical Ltd.

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Improper Privilege Management

EUVDB-ID: #VU53725

Risk: Medium

CVSSv4.0: 2.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/U:Green]

CVE-ID: CVE-2021-28091

CWE-ID: CWE-269 - Improper Privilege Management

Exploit availability: No

Description

The vulnerability allows an attacker to impersonate other users.

The vulnerability exists due to improper privilege management within Lasso SAML implementation. A remote authenticated user can impersonate other authorized application users while interacting with the application.

Mitigation

Update the affected package lasso to the latest version.

Vulnerable software versions

Ubuntu: 18.04 - 21.04

python3-lasso (Ubuntu package): before 2.5.1-0ubuntu1.2

liblasso3 (Ubuntu package): before 2.5.1-0ubuntu1.2

liblasso-perl (Ubuntu package): before 2.5.1-0ubuntu1.2

python-lasso (Ubuntu package): before 2.5.1-0ubuntu1.2

CPE2.3 External links

https://ubuntu.com/security/notices/USN-4974-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.



###SIDEBAR###