vmware single-sign-on-for-tanzu CVE-2020-5425 is a vulnerability in VMware Single Sign On For Tanzu
Published on October 31, 2020

User Impersonation possible in Tanzu SSO
Single Sign-On for Vmware Tanzu all versions prior to 1.11.3 ,1.12.x versions prior to 1.12.4 and 1.13.x prior to 1.13.1 are vulnerable to user impersonation attack.If two users are logged in to the SSO operator dashboard at the same time, with the same username, from two different identity providers, one can acquire the token of the other and thus operate with their permissions. Note: Foundation may be vulnerable only if: 1) The system zone is set up to use a SAML identity provider 2) There are internal users that have the same username as users in the external SAML provider 3) Those duplicate-named users have the scope to access the SSO operator dashboard 4) The vulnerability doesn't appear with LDAP because of chained authentication.

NVD

Weakness Type

What is an authentification Vulnerability?

When an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct.

CVE-2020-5425 has been classified to as an authentification vulnerability or weakness.


Products Associated with CVE-2020-5425

You can be notified by email with stack.watch whenever vulnerabilities like CVE-2020-5425 are published in VMware Single Sign On For Tanzu:

 

Affected Versions

Single Sign-On for VMware Tanzu:

Exploit Probability

EPSS
0.13%
Percentile
32.46%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.