CVE-2024-41107

The CloudStack SAML authentication (disabled by default) does not enforce signature check. In CloudStack environments where SAML authentication is enabled, an attacker that initiates CloudStack SAML single sign-on authentication can bypass SAML authentication by submitting a spoofed SAML response with no signature and known or guessed username and other user details of a SAML-enabled CloudStack user-account. In such environments, this can result in a complete compromise of the resources owned and/or accessible by a SAML enabled user-account. Affected users are recommended to disable the SAML authentication plugin by setting the "saml2.enabled" global setting to "false", or upgrade to version 4.18.2.2, 4.19.1.0 or later, which addresses this issue.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:cloudstack:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:cloudstack:*:*:*:*:*:*:*:*

History

10 Sep 2024, 14:30

Type Values Removed Values Added
CPE cpe:2.3:a:apache:cloudstack:*:*:*:*:*:*:*:*
References () http://www.openwall.com/lists/oss-security/2024/07/19/1 - () http://www.openwall.com/lists/oss-security/2024/07/19/1 - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2024/07/19/2 - () http://www.openwall.com/lists/oss-security/2024/07/19/2 - Mailing List, Third Party Advisory
References () https://cloudstack.apache.org/blog/security-release-advisory-cve-2024-41107 - () https://cloudstack.apache.org/blog/security-release-advisory-cve-2024-41107 - Mitigation, Vendor Advisory
References () https://github.com/apache/cloudstack/issues/4519 - () https://github.com/apache/cloudstack/issues/4519 - Issue Tracking
References () https://lists.apache.org/thread/5q06g8zvmhcw6w3tjr6r5prqdw6zckg3 - () https://lists.apache.org/thread/5q06g8zvmhcw6w3tjr6r5prqdw6zckg3 - Mailing List, Vendor Advisory
References () https://www.shapeblue.com/shapeblue-security-advisory-apache-cloudstack-cve-2024-41107 - () https://www.shapeblue.com/shapeblue-security-advisory-apache-cloudstack-cve-2024-41107 - Third Party Advisory
First Time Apache cloudstack
Apache

01 Aug 2024, 13:58

Type Values Removed Values Added
Summary
  • (es) La autenticación SAML de CloudStack (deshabilitada de forma predeterminada) no exige la verificación de firmas. En entornos de CloudStack donde la autenticación SAML está habilitada, un atacante que inicia la autenticación de inicio de sesión único SAML de CloudStack puede omitir la autenticación SAML enviando una respuesta SAML falsificada sin firma y con un nombre de usuario conocido o adivinado y otros detalles de usuario de un usuario de CloudStack habilitado para SAML. cuenta. En tales entornos, esto puede resultar en un compromiso total de los recursos que posee y/o a los que puede acceder una cuenta de usuario habilitada para SAML. Se recomienda a los usuarios afectados que deshabiliten el complemento de autenticación SAML configurando "saml2.enabled" en configuración global en "false" o actualicen a la versión 4.18.2.2, 4.19.1.0 o posterior, que soluciona este problema.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.1

19 Jul 2024, 14:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/07/19/1 -
  • () http://www.openwall.com/lists/oss-security/2024/07/19/2 -

19 Jul 2024, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-19 11:15

Updated : 2024-09-10 14:30


NVD link : CVE-2024-41107

Mitre link : CVE-2024-41107

CVE.ORG link : CVE-2024-41107


JSON object : View

Products Affected

apache

  • cloudstack
CWE
CWE-290

Authentication Bypass by Spoofing