Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-1953 | Open Access Management (OpenAM) is an access management solution that includes Authentication, SSO, Authorization, Federation, Entitlements and Web Services Security. OpenAM up to version 14.7.2 does not properly validate the signature of SAML responses received as part of the SAMLv1.x Single Sign-On process. Attackers can use this fact to impersonate any OpenAM user, including the administrator, by sending a specially crafted SAML response to the SAMLPOSTProfileServlet servlet. This problem has been patched in OpenAM 14.7.3-SNAPSHOT and later. User unable to upgrade should comment servlet `SAMLPOSTProfileServlet` from their pom file. See the linked GHSA for details. |
Github GHSA |
GHSA-4mh8-9wq6-rjxg | OpenAM vulnerable to user impersonation using SAMLv1.x SSO process |
Thu, 24 Oct 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-10-24T14:53:39.210Z
Reserved: 2023-07-06T13:01:36.998Z
Link: CVE-2023-37471
Updated: 2024-08-02T17:16:30.329Z
Status : Modified
Published: 2023-07-20T17:15:10.917
Modified: 2024-11-21T08:11:46.770
Link: CVE-2023-37471
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA