CVE-2022-4496 – miniOrange WordPress SAML SSO multiple versions - Open Redirect in SSO login
https://notcve.org/view.php?id=CVE-2022-4496
The SAML SSO Standard WordPress plugin version 16.0.0 before 16.0.8, SAML SSO Premium WordPress plugin version 12.0.0 before 12.1.0 and SAML SSO Premium Multisite WordPress plugin version 20.0.0 before 20.0.7 does not validate that the redirect parameter to its SSO login endpoint points to an internal site URL, making it vulnerable to an Open Redirect issue when the user is already logged in. The SSO Login Premium Multisite plugin for WordPress is vulnerable to Open Redirect in versions up to, and including, 20.0.7 due to missing validation of its redirect parameter. This makes it possible for an attacker to redirect authenticated users. This vulnerability also affects the Premium Edition (versions <12.1.0) and Standard Edition (versions <16.0.8) of the plugin. • https://wpscan.com/vulnerability/af2e30c7-0787-4fe2-97ee-bc616f7178a1 https://wpscan.com/vulnerability/be21f355-0e5b-4ad7-9d8f-85e9a0101ddc https://wpscan.com/vulnerability/e6c4c8c7-1dcd-45bf-8582-f12accca6fac • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •
CVE-2020-6850 – SAML Single Sign On – SAML SSO Login <= 4.8.83 - Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2020-6850
Utilities.php in the miniorange-saml-20-single-sign-on plugin before 4.8.84 for WordPress allows XSS via a crafted SAML XML Response to wp-login.php. This is related to the SAMLResponse and RelayState variables, and the Destination parameter of the samlp:Response XML element. El archivo Utilities.php en el plugin miniorange-saml-20-single-sign-on versiones anteriores a 4.8.84 para WordPress, permite un ataque de tipo XSS por medio de una Respuesta XML SAML diseñada en el archivo wp-login.php. Esto está relacionado con las variables SAMLResponse y RelayState y el parámetro Destination del elemento XML samlp:Response. • https://wordpress.org/plugins/miniorange-saml-20-single-sign-on/#developers https://zeroauth.ltd/blog https://zeroauth.ltd/blog/2020/01/28/cve-2020-6850-miniorange-saml-wp-plugin-before-4-8-84-is-vulnerable-to-xss-via-a-specially-crafted-saml-xml-response • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2019-12346 – SAML Single Sign On – SAML SSO Login < 4.8.73 - Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2019-12346
In the miniOrange SAML SP Single Sign On plugin before 4.8.73 for WordPress, the SAML Login Endpoint is vulnerable to XSS via a specially crafted SAMLResponse XML post. En el plugin Single Sign On de miniOrange SAML SP anterior a versión 4.8.73 para WordPress, el Endpoint Login de SAML es vulnerable a ataques XSS por medio de una publicación XML SAMLResponse especialmente creada. • https://wpvulndb.com/vulnerabilities/9397 https://zeroauth.ltd/blog/2019/05/27/cve-2019-12346-miniorange-saml-sp-single-sign-on-wordpress-plugin-xss • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •