CVE-2022-24129

The OIDC OP plugin before 3.0.4 for Shibboleth Identity Provider allows server-side request forgery (SSRF) due to insufficient restriction of the request_uri parameter. This allows attackers to interact with arbitrary third-party HTTP services.
Configurations

Configuration 1 (hide)

cpe:2.3:a:shibboleth:oidc_op:*:*:*:*:*:identity_provider:*:*

History

21 Nov 2024, 06:49

Type Values Removed Values Added
References () http://shibboleth.net/community/advisories/ - Vendor Advisory () http://shibboleth.net/community/advisories/ - Vendor Advisory
References () http://shibboleth.net/community/advisories/secadv_20220131.txt - Vendor Advisory () http://shibboleth.net/community/advisories/secadv_20220131.txt - Vendor Advisory
References () https://github.com/sbaresearch/advisories/tree/public/2022/SBA-ADV-20220127-01_Shibboleth_IdP_OIDC_OP_Plugin_SSRF - Exploit, Third Party Advisory () https://github.com/sbaresearch/advisories/tree/public/2022/SBA-ADV-20220127-01_Shibboleth_IdP_OIDC_OP_Plugin_SSRF - Exploit, Third Party Advisory

Information

Published : 2022-02-04 20:15

Updated : 2024-11-21 06:49


NVD link : CVE-2022-24129

Mitre link : CVE-2022-24129

CVE.ORG link : CVE-2022-24129


JSON object : View

Products Affected

shibboleth

  • oidc_op
CWE
CWE-918

Server-Side Request Forgery (SSRF)