Open Access Management (OpenAM) is an access management solution that includes Authentication, SSO, Authorization, Federation, Entitlements and Web Services Security. OpenAM up to version 14.7.2 does not properly validate the signature of SAML responses received as part of the SAMLv1.x Single Sign-On process. Attackers can use this fact to impersonate any OpenAM user, including the administrator, by sending a specially crafted SAML response to the SAMLPOSTProfileServlet servlet. This problem has been patched in OpenAM 14.7.3-SNAPSHOT and later. User unable to upgrade should comment servlet `SAMLPOSTProfileServlet` from their pom file. See the linked GHSA for details.
History

Thu, 24 Oct 2024 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2023-07-20T16:53:23.977Z

Updated: 2024-10-24T14:53:39.210Z

Reserved: 2023-07-06T13:01:36.998Z

Link: CVE-2023-37471

cve-icon Vulnrichment

Updated: 2024-08-02T17:16:30.329Z

cve-icon NVD

Status : Modified

Published: 2023-07-20T17:15:10.917

Modified: 2024-11-21T08:11:46.770

Link: CVE-2023-37471

cve-icon Redhat

No data.