ssoready is a single sign on provider implemented via docker. Affected versions are vulnerable to XML signature bypass attacks. An attacker can carry out signature bypass if you have access to certain IDP-signed messages. The underlying mechanism exploits differential behavior between XML parsers. Users of https://ssoready.com, the public hosted instance of SSOReady, are unaffected. We advise folks who self-host SSOReady to upgrade to 7f92a06 or later. Do so by updating your SSOReady Docker images from sha-... to sha-7f92a06. There are no known workarounds for this vulnerability.
CVSS
No CVSS.
References
Configurations
No configuration.
History
10 Oct 2024, 12:51
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
09 Oct 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-09 19:15
Updated : 2024-10-10 12:51
NVD link : CVE-2024-47832
Mitre link : CVE-2024-47832
CVE.ORG link : CVE-2024-47832
JSON object : View
Products Affected
No product.
CWE
CWE-347
Improper Verification of Cryptographic Signature