Description
Apache Guacamole 1.2.0 and 1.3.0 do not properly validate responses received from a SAML identity provider. If SAML support is enabled, this may allow a malicious user to assume the identity of another Guacamole user.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-30858 | Apache Guacamole 1.2.0 and 1.3.0 do not properly validate responses received from a SAML identity provider. If SAML support is enabled, this may allow a malicious user to assume the identity of another Guacamole user. |
References
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-04T04:10:17.191Z
Reserved: 2021-11-18T00:00:00.000Z
Link: CVE-2021-43999
No data.
Status : Modified
Published: 2022-01-11T22:15:07.627
Modified: 2024-11-21T06:30:10.790
Link: CVE-2021-43999
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD