Описание
ssoready is a single sign on provider implemented via docker. Affected versions are vulnerable to XML signature bypass attacks. An attacker can carry out signature bypass if you have access to certain IDP-signed messages. The underlying mechanism exploits differential behavior between XML parsers. Users of https://ssoready.com, the public hosted instance of SSOReady, are unaffected. We advise folks who self-host SSOReady to upgrade to 7f92a06 or later. Do so by updating your SSOReady Docker images from sha-... to sha-7f92a06. There are no known workarounds for this vulnerability.
Уязвимые конфигурации
Конфигурация 1Версия до 2024-10-09 (исключая)
cpe:2.3:a:ssoready:ssoready:*:*:*:*:*:*:*:*
EPSS
Процентиль: 23%
0.00078
Низкий
9.8 Critical
CVSS3
Дефекты
CWE-347
Связанные уязвимости
CVSS3: 9.8
github
больше 1 года назад
SSOReady has an XML Signature Bypass via differential XML parsing
EPSS
Процентиль: 23%
0.00078
Низкий
9.8 Critical
CVSS3
Дефекты
CWE-347