← Zuruck zu CVEs
CVE-2024-47832
CRITICAL9.8
Beschreibung
ssoready is a single sign on provider implemented via docker. Affected versions are vulnerable to XML signature bypass attacks. An attacker can carry out signature bypass if you have access to certain IDP-signed messages. The underlying mechanism exploits differential behavior between XML parsers. Users of https://ssoready.com, the public hosted instance of SSOReady, are unaffected. We advise folks who self-host SSOReady to upgrade to 7f92a06 or later. Do so by updating your SSOReady Docker images from sha-... to sha-7f92a06. There are no known workarounds for this vulnerability.
CVE Details
CVSS v3.1 Bewertung9.8
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht10/9/2024
Zuletzt geandert3/6/2025
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
ssoready:ssoready
Schwachen (CWE)
CWE-347
Referenzen
https://github.com/ssoready/ssoready/commit/7f92a0630439972fcbefa8c7eafe8c144bd89915(security-advisories@github.com)
https://github.com/ssoready/ssoready/security/advisories/GHSA-j2hr-q93x-gxvh(security-advisories@github.com)
https://ssoready.com/docs/self-hosting/self-hosting-sso-ready(security-advisories@github.com)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.