Lucene search

K
cvelistApacheCVELIST:CVE-2024-41107
HistoryJul 19, 2024 - 10:19 a.m.

CVE-2024-41107 Apache CloudStack: SAML Signature Exclusion

2024-07-1910:19:53
CWE-290
apache
www.cve.org
5
cloudstack
saml
signature
exclusion
authentication
spoofing
vulnerability
disabling
upgrade

EPSS

0.839

Percentile

98.5%

The CloudStack SAML authentication (disabled by default) does not enforce signature check. In CloudStack environments where SAML authentication is enabled, an attacker that initiates CloudStack SAML single sign-on authentication can bypass SAML authentication by submitting a spoofed SAML response with no signature and known or guessed username and other user details of a SAML-enabled CloudStack user-account.Β In such environments, this can result in a complete compromise of the resources owned and/or accessible by a SAML enabled user-account.

Affected users are recommended to disable the SAML authentication plugin by setting theΒ β€œsaml2.enabled” global setting to β€œfalse”, or upgrade to version 4.18.2.2, 4.19.1.0 or later, which addresses this issue.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Apache CloudStack",
    "vendor": "Apache Software Foundation",
    "versions": [
      {
        "lessThanOrEqual": "4.18.2.1",
        "status": "affected",
        "version": "4.5.0",
        "versionType": "semver"
      },
      {
        "lessThanOrEqual": "4.19.0.2",
        "status": "affected",
        "version": "4.19.0.0",
        "versionType": "semver"
      }
    ]
  }
]

EPSS

0.839

Percentile

98.5%

Related for CVELIST:CVE-2024-41107