Description
The web application uses SAML. The web application's SAML Consumer Service uses a retired hash function for the digital signature.
An authenticated attacker may be able to use it to escalate privileges to a high privileged user or to takeover accounts of other users in the application.
Remediation
Change configuration of the SAML service to require a more secure hash function for the digital signature
References
Related Vulnerabilities
WordPress Plugin Login as User or Customer Privilege Escalation (3.2)
JIRA Security Advisory 2012-08-28
WordPress Plugin PowerPack for Beaver Builder Privilege Escalation (2.33.0)
WordPress Plugin WP e-Commerce-Store Exporter Privilege Escalation (1.6.6)
WordPress Plugin WP Job Manager Privilege Escalation (1.34.3)