Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-41912

Опубликовано: 28 нояб. 2022
Источник: redhat
CVSS3: 9.1
EPSS Низкий

Описание

The crewjam/saml go library prior to version 0.4.9 is vulnerable to an authentication bypass when processing SAML responses containing multiple Assertion elements. This issue has been corrected in version 0.4.9. There are no workarounds other than upgrading to a fixed version.

An authentication bypass flaw was discovered in the crewjam/saml go package. A remote unauthenticated attacker could trigger it by sending a SAML request. This would allow an escalation of privileges and then enable compromising system integrity.

Отчет

Whilst the Red Hat Advanced Cluster Management for Kubernetes (RHACM) acm-grafana container include the vulnerable underscore library, the access to it is protected by OpenShift OAuth. Therefore the impact by this flaw is reduced from Critical to Important. The OCP grafana-container includes the vulnerable underscore library, the access to it is protected by OpenShift OAuth. Therefore the impact by this flaw is reduced from Critical to Important. While Red Hat Ceph Storage 4's grafana-container includes the affected code, this is used for logging and limits access to the rest of the Ceph cluster. Thus the impact has been reduced from critical to important. Red Hat Ceph Storage 3 and 4 do not use crewjam/saml in their version of grafana.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Ceph Storage 5rhceph/rhceph-5-dashboard-rhel8Not affected
Red Hat Enterprise Linux 8grafanaNot affected
Red Hat Advanced Cluster Management for Kubernetes 2acm-governance-policy-addon-controller-containerFixedRHSA-2022:904014.12.2022
Red Hat Advanced Cluster Management for Kubernetes 2acm-grafana-containerFixedRHSA-2022:904014.12.2022
Red Hat Advanced Cluster Management for Kubernetes 2acm-must-gather-containerFixedRHSA-2022:904014.12.2022
Red Hat Advanced Cluster Management for Kubernetes 2acm-operator-bundle-containerFixedRHSA-2022:904014.12.2022
Red Hat Advanced Cluster Management for Kubernetes 2acm-prometheus-config-reloader-containerFixedRHSA-2022:904014.12.2022
Red Hat Advanced Cluster Management for Kubernetes 2acm-prometheus-operator-containerFixedRHSA-2022:904014.12.2022
Red Hat Advanced Cluster Management for Kubernetes 2acm-volsync-addon-controller-containerFixedRHSA-2022:904014.12.2022
Red Hat Advanced Cluster Management for Kubernetes 2cert-policy-controller-containerFixedRHSA-2022:904014.12.2022

Показывать по

Дополнительная информация

Статус:

Critical
Дефект:
CWE-287->CWE-165
https://bugzilla.redhat.com/show_bug.cgi?id=2149181crewjam/saml: Authentication bypass when processing SAML responses containing multiple Assertion elements

EPSS

Процентиль: 50%
0.00273
Низкий

9.1 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.1
ubuntu
около 3 лет назад

The crewjam/saml go library prior to version 0.4.9 is vulnerable to an authentication bypass when processing SAML responses containing multiple Assertion elements. This issue has been corrected in version 0.4.9. There are no workarounds other than upgrading to a fixed version.

CVSS3: 9.1
nvd
около 3 лет назад

The crewjam/saml go library prior to version 0.4.9 is vulnerable to an authentication bypass when processing SAML responses containing multiple Assertion elements. This issue has been corrected in version 0.4.9. There are no workarounds other than upgrading to a fixed version.

CVSS3: 9.1
debian
около 3 лет назад

The crewjam/saml go library prior to version 0.4.9 is vulnerable to an ...

CVSS3: 9.1
github
около 3 лет назад

crewjam/saml vulnerable to signature bypass via multiple Assertion elements due to improper authentication

EPSS

Процентиль: 50%
0.00273
Низкий

9.1 Critical

CVSS3

Уязвимость CVE-2022-41912