SysAid - Okta SSO integration - was found vulnerable to XML External Entity Injection vulnerability. Any SysAid environment that uses the Okta SSO integration might be vulnerable. An unauthenticated attacker could exploit the XXE vulnerability by sending a malformed POST request to the identity provider endpoint. An attacker can extract the identity provider endpoint by decoding the SAMLRequest parameter's value and searching for the AssertionConsumerServiceURL parameter's value. It often allows an attacker to view files on the application server filesystem and interact with any back-end or external systems that the application can access. In some situations, an attacker can escalate an XXE attack to compromise the underlying server or other back-end infrastructure by leveraging the XXE vulnerability to perform server-side request forgery (SSRF) attacks.
References
Link | Resource |
---|---|
https://www.gov.il/en/departments/faq/cve_advisories | Third Party Advisory |
https://www.gov.il/en/departments/faq/cve_advisories | Third Party Advisory |
Configurations
History
21 Nov 2024, 06:48
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.gov.il/en/departments/faq/cve_advisories - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 6.8
v3 : 5.9 |
Information
Published : 2022-06-24 15:15
Updated : 2024-11-21 06:48
NVD link : CVE-2022-23170
Mitre link : CVE-2022-23170
CVE.ORG link : CVE-2022-23170
JSON object : View
Products Affected
sysaid
- okta_sso
CWE
CWE-611
Improper Restriction of XML External Entity Reference