We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-47832

XML Signature Bypass via differential XML parsing in ssoready



Description

ssoready is a single sign on provider implemented via docker. Affected versions are vulnerable to XML signature bypass attacks. An attacker can carry out signature bypass if you have access to certain IDP-signed messages. The underlying mechanism exploits differential behavior between XML parsers. Users of https://ssoready.com, the public hosted instance of SSOReady, are unaffected. We advise folks who self-host SSOReady to upgrade to 7f92a06 or later. Do so by updating your SSOReady Docker images from sha-... to sha-7f92a06. There are no known workarounds for this vulnerability.

Reserved 2024-10-03 | Published 2024-10-09 | Updated 2024-10-11 | Assigner GitHub_M


CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-347: Improper Verification of Cryptographic Signature

Product status

< 0.0.0-20241009153838-7f92a0630439
affected

References

github.com/...oready/security/advisories/GHSA-j2hr-q93x-gxvh

github.com/...ommit/7f92a0630439972fcbefa8c7eafe8c144bd89915

ssoready.com/docs/self-hosting/self-hosting-sso-ready

cve.org (CVE-2024-47832)

nvd.nist.gov (CVE-2024-47832)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-47832

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.