Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2021-28091 |
CWE-ID | CWE-269 |
Exploitation vector | Network |
Public exploit | Public exploit code for vulnerability #1 is available. |
Vulnerable software |
Ubuntu Operating systems & Components / Operating system python3-lasso (Ubuntu package) Operating systems & Components / Operating system package or component liblasso3 (Ubuntu package) Operating systems & Components / Operating system package or component liblasso-perl (Ubuntu package) Operating systems & Components / Operating system package or component python-lasso (Ubuntu package) Operating systems & Components / Operating system package or component |
Vendor | Canonical Ltd. |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU53725
Risk: Medium
CVSSv4.0: 2.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/U:Green]
CVE-ID: CVE-2021-28091
CWE-ID:
CWE-269 - Improper Privilege Management
Exploit availability: No
DescriptionThe vulnerability allows an attacker to impersonate other users.
The vulnerability exists due to improper privilege management within Lasso SAML implementation. A remote authenticated user can impersonate other authorized application users while interacting with the application.
Update the affected package lasso to the latest version.
Vulnerable software versionsUbuntu: 18.04 - 21.04
python3-lasso (Ubuntu package): before 2.5.1-0ubuntu1.2
liblasso3 (Ubuntu package): before 2.5.1-0ubuntu1.2
liblasso-perl (Ubuntu package): before 2.5.1-0ubuntu1.2
python-lasso (Ubuntu package): before 2.5.1-0ubuntu1.2
CPE2.3https://ubuntu.com/security/notices/USN-4974-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.