ssoready is a single sign on provider implemented via docker. Affected versions are vulnerable to XML signature bypass attacks. An attacker can carry out signature bypass if you have access to certain IDP-signed messages. The underlying mechanism exploits differential behavior between XML parsers. Users of https://ssoready.com, the public hosted instance of SSOReady, are unaffected. We advise folks who self-host SSOReady to upgrade to 7f92a06 or later. Do so by updating your SSOReady Docker images from sha-... to sha-7f92a06. There are no known workarounds for this vulnerability.
Metrics
Affected Vendors & Products
References
History
Wed, 09 Oct 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Ssoready
Ssoready ssoready |
|
CPEs | cpe:2.3:a:ssoready:ssoready:*:*:*:*:*:*:*:* | |
Vendors & Products |
Ssoready
Ssoready ssoready |
|
Metrics |
ssvc
|
Wed, 09 Oct 2024 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | ssoready is a single sign on provider implemented via docker. Affected versions are vulnerable to XML signature bypass attacks. An attacker can carry out signature bypass if you have access to certain IDP-signed messages. The underlying mechanism exploits differential behavior between XML parsers. Users of https://ssoready.com, the public hosted instance of SSOReady, are unaffected. We advise folks who self-host SSOReady to upgrade to 7f92a06 or later. Do so by updating your SSOReady Docker images from sha-... to sha-7f92a06. There are no known workarounds for this vulnerability. | |
Title | XML Signature Bypass via differential XML parsing in ssoready | |
Weaknesses | CWE-347 | |
References |
| |
Metrics |
cvssV4_0
|
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-10-09T18:32:19.800Z
Updated: 2024-10-11T16:58:48.177Z
Reserved: 2024-10-03T14:06:12.643Z
Link: CVE-2024-47832
Vulnrichment
Updated: 2024-10-09T20:13:24.706Z
NVD
Status : Awaiting Analysis
Published: 2024-10-09T19:15:14.647
Modified: 2024-10-10T12:51:56.987
Link: CVE-2024-47832
Redhat
No data.