SOGo 2.x before 2.4.1 and 3.x through 5.x before 5.1.1 does not validate the signatures of any SAML assertions it receives. Any actor with network access to the deployment could impersonate users when SAML is the authentication method. (Only versions after 2.0.5a are affected.)
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2707-1 | sogo security update |
Debian DSA |
DSA-5029-1 | sogo security update |
EUVD |
EUVD-2021-19769 | SOGo 2.x before 2.4.1 and 3.x through 5.x before 5.1.1 does not validate the signatures of any SAML assertions it receives. Any actor with network access to the deployment could impersonate users when SAML is the authentication method. (Only versions after 2.0.5a are affected.) |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T23:42:19.503Z
Reserved: 2021-05-17T00:00:00
Link: CVE-2021-33054
No data.
Status : Modified
Published: 2021-06-04T15:15:07.647
Modified: 2024-11-21T06:08:11.387
Link: CVE-2021-33054
No data.
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD