Vulnerability Change Records for CVE-2024-47832
Change History
New CVE Received from GitHub, Inc. 10/09/2024 3:15:14 PM
Action |
Type |
Old Value |
New Value |
Added |
Description |
|
ssoready is a single sign on provider implemented via docker. Affected versions are vulnerable to XML signature bypass attacks. An attacker can carry out signature bypass if you have access to certain IDP-signed messages. The underlying mechanism exploits differential behavior between XML parsers. Users of https://ssoready.com, the public hosted instance of SSOReady, are unaffected. We advise folks who self-host SSOReady to upgrade to 7f92a06 or later. Do so by updating your SSOReady Docker images from sha-... to sha-7f92a06. There are no known workarounds for this vulnerability.
|
Added |
CVSS V4.0 |
|
GitHub, Inc. CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
|
Added |
CWE |
|
GitHub, Inc. CWE-347
|
Added |
Reference |
|
GitHub, Inc. https://github.com/ssoready/ssoready/commit/7f92a0630439972fcbefa8c7eafe8c144bd89915 [No types assigned]
|
Added |
Reference |
|
GitHub, Inc. https://github.com/ssoready/ssoready/security/advisories/GHSA-j2hr-q93x-gxvh [No types assigned]
|
Added |
Reference |
|
GitHub, Inc. https://ssoready.com/docs/self-hosting/self-hosting-sso-ready [No types assigned]
|
|