Open Access Management (OpenAM) is an access management solution that includes Authentication, SSO, Authorization, Federation, Entitlements and Web Services Security. OpenAM up to version 14.7.2 does not properly validate the signature of SAML responses received as part of the SAMLv1.x Single Sign-On process. Attackers can use this fact to impersonate any OpenAM user, including the administrator, by sending a specially crafted SAML response to the SAMLPOSTProfileServlet servlet. This problem has been patched in OpenAM 14.7.3-SNAPSHOT and later. User unable to upgrade should comment servlet `SAMLPOSTProfileServlet` from their pom file. See the linked GHSA for details.
Metrics
Affected Vendors & Products
References
History
Thu, 24 Oct 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2023-07-20T16:53:23.977Z
Updated: 2024-10-24T14:53:39.210Z
Reserved: 2023-07-06T13:01:36.998Z
Link: CVE-2023-37471
Vulnrichment
Updated: 2024-08-02T17:16:30.329Z
NVD
Status : Modified
Published: 2023-07-20T17:15:10.917
Modified: 2024-11-21T08:11:46.770
Link: CVE-2023-37471
Redhat
No data.