CVE-2020-5425 is a vulnerability in VMware Single Sign On For Tanzu
Published on October 31, 2020
User Impersonation possible in Tanzu SSO
Single Sign-On for Vmware Tanzu all versions prior to 1.11.3 ,1.12.x versions prior to 1.12.4 and 1.13.x prior to 1.13.1 are vulnerable to user impersonation attack.If two users are logged in to the SSO operator dashboard at the same time, with the same username, from two different identity providers, one can acquire the token of the other and thus operate with their permissions. Note: Foundation may be vulnerable only if: 1) The system zone is set up to use a SAML identity provider 2) There are internal users that have the same username as users in the external SAML provider 3) Those duplicate-named users have the scope to access the SSO operator dashboard 4) The vulnerability doesn't appear with LDAP because of chained authentication.
Weakness Type
What is an authentification Vulnerability?
When an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct.
CVE-2020-5425 has been classified to as an authentification vulnerability or weakness.
Products Associated with CVE-2020-5425
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2020-5425 are published in VMware Single Sign On For Tanzu:
Affected Versions
Single Sign-On for VMware Tanzu:- Version 1.11 and below 1.11.3 is affected.
- Version 1.12 and below 1.12.4 is affected.
- Version 1.13 and below 1.13.1 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.