ssoready is a single sign on provider implemented via docker. Affected versions are vulnerable to XML signature bypass attacks. An attacker can carry out signature bypass if you have access to certain IDP-signed messages. The underlying mechanism exploits differential behavior between XML parsers. Users of https://ssoready.com, the public hosted instance of SSOReady, are unaffected. We advise folks who self-host SSOReady to upgrade to 7f92a06 or later. Do so by updating your SSOReady Docker images from sha-... to sha-7f92a06. There are no known workarounds for this vulnerability.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-3063 ssoready is a single sign on provider implemented via docker. Affected versions are vulnerable to XML signature bypass attacks. An attacker can carry out signature bypass if you have access to certain IDP-signed messages. The underlying mechanism exploits differential behavior between XML parsers. Users of https://ssoready.com, the public hosted instance of SSOReady, are unaffected. We advise folks who self-host SSOReady to upgrade to 7f92a06 or later. Do so by updating your SSOReady Docker images from sha-... to sha-7f92a06. There are no known workarounds for this vulnerability.
Github GHSA Github GHSA GHSA-j2hr-q93x-gxvh SSOReady has an XML Signature Bypass via differential XML parsing
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 09 Oct 2024 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Ssoready
Ssoready ssoready
CPEs cpe:2.3:a:ssoready:ssoready:*:*:*:*:*:*:*:*
Vendors & Products Ssoready
Ssoready ssoready
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 09 Oct 2024 18:45:00 +0000

Type Values Removed Values Added
Description ssoready is a single sign on provider implemented via docker. Affected versions are vulnerable to XML signature bypass attacks. An attacker can carry out signature bypass if you have access to certain IDP-signed messages. The underlying mechanism exploits differential behavior between XML parsers. Users of https://ssoready.com, the public hosted instance of SSOReady, are unaffected. We advise folks who self-host SSOReady to upgrade to 7f92a06 or later. Do so by updating your SSOReady Docker images from sha-... to sha-7f92a06. There are no known workarounds for this vulnerability.
Title XML Signature Bypass via differential XML parsing in ssoready
Weaknesses CWE-347
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-10-11T16:58:48.177Z

Reserved: 2024-10-03T14:06:12.643Z

Link: CVE-2024-47832

cve-icon Vulnrichment

Updated: 2024-10-09T20:13:24.706Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-10-09T19:15:14.647

Modified: 2024-10-10T12:51:56.987

Link: CVE-2024-47832

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.