CVE-2022-44457

A vulnerability has been identified in Mendix SAML (Mendix 7 compatible) (All versions < V1.17.0), Mendix SAML (Mendix 7 compatible) (All versions >= V1.17.0 < V1.17.2), Mendix SAML (Mendix 8 compatible) (All versions < V2.3.0), Mendix SAML (Mendix 8 compatible) (All versions >= V2.3.0 < V2.3.2), Mendix SAML (Mendix 9 compatible, New Track) (All versions < V3.3.1), Mendix SAML (Mendix 9 compatible, New Track) (All versions >= V3.3.1 < V3.3.5), Mendix SAML (Mendix 9 compatible, Upgrade Track) (All versions < V3.3.0), Mendix SAML (Mendix 9 compatible, Upgrade Track) (All versions >= V3.3.0 < V3.3.4). Affected versions of the module insufficiently protect from packet capture replay, only when the not recommended, non default configuration option `'Allow Idp Initiated Authentication'` is enabled. This CVE entry describes the incomplete fix for CVE-2022-37011 in a specific non default configuration.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mendix:saml:*:*:*:*:*:*:*:*
cpe:2.3:a:mendix:saml:*:*:*:*:*:*:*:*
cpe:2.3:a:mendix:saml:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2022-11-08 11:15

Updated : 2024-02-28 19:29


NVD link : CVE-2022-44457

Mitre link : CVE-2022-44457

CVE.ORG link : CVE-2022-44457


JSON object : View

Products Affected

mendix

  • saml
CWE
CWE-294

Authentication Bypass by Capture-replay