CVE-2024-47832

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-47832
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-47832.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-47832
Aliases
Related
Published
2024-10-09T19:15:14Z
Modified
2024-10-11T14:57:05.197904Z
Summary
[none]
Details

ssoready is a single sign on provider implemented via docker. Affected versions are vulnerable to XML signature bypass attacks. An attacker can carry out signature bypass if you have access to certain IDP-signed messages. The underlying mechanism exploits differential behavior between XML parsers. Users of https://ssoready.com, the public hosted instance of SSOReady, are unaffected. We advise folks who self-host SSOReady to upgrade to 7f92a06 or later. Do so by updating your SSOReady Docker images from sha-... to sha-7f92a06. There are no known workarounds for this vulnerability.

References

Affected packages

Git / github.com/ssoready/ssoready

Affected ranges

Type
GIT
Repo
https://github.com/ssoready/ssoready
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed