[MAVEN:GHSA-4MH8-9WQ6-RJXG] OpenAM vulnerable to user impersonation using SAMLv1.x SSO process

Severity Critical
Affected Packages 1
Fixed Packages 1
CVEs 1

Impact

OpenAM up to version 14.7.2 does not properly validate the signature of SAML responses received as part of the SAMLv1.x Single Sign-On process. Attackers can use this fact to impersonate any OpenAM user, including the administrator, by sending a specially crafted SAML response to the SAMLPOSTProfileServlet servlet.

Patches

This problem has been patched in OpenAM 14.7.3-SNAPSHOT and later

Workarounds

One should comment servlet SAMLPOSTProfileServlet in web.xml or disable SAML in OpenAM
xml
<servlet>
<description>SAMLPOSTProfileServlet</description>
<servlet-name>SAMLPOSTProfileServlet</servlet-name>
<servlet-class>com.sun.identity.saml.servlet.SAMLPOSTProfileServlet</servlet-class>
</servlet>
...
<servlet-mapping>
<servlet-name>SAMLSOAPReceiver</servlet-name>
<url-pattern>/SAMLSOAPReceiver</url-pattern>
</servlet-mapping>

References

#624

ID
MAVEN:GHSA-4MH8-9WQ6-RJXG
Severity
critical
URL
https://github.com/advisories/GHSA-4mh8-9wq6-rjxg
Published
2023-07-20T18:54:13
(14 months ago)
Modified
2023-11-11T05:04:27
(10 months ago)
Rights
Maven Security Team
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:maven/org.openidentityplatform.openam/openam-federation-library org.openidentityplatform.openam openam-federation-library < 14.7.3
Fixed pkg:maven/org.openidentityplatform.openam/openam-federation-library org.openidentityplatform.openam openam-federation-library = 14.7.3
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...