// For flags

CVE-2024-41107

Apache CloudStack: SAML Signature Exclusion

Severity Score

8.1
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

The CloudStack SAML authentication (disabled by default) does not enforce signature check. In CloudStack environments where SAML authentication is enabled, an attacker that initiates CloudStack SAML single sign-on authentication can bypass SAML authentication by submitting a spoofed SAML response with no signature and known or guessed username and other user details of a SAML-enabled CloudStack user-account. In such environments, this can result in a complete compromise of the resources owned and/or accessible by a SAML enabled user-account.

Affected users are recommended to disable the SAML authentication plugin by setting the "saml2.enabled" global setting to "false", or upgrade to version 4.18.2.2, 4.19.1.0 or later, which addresses this issue.

La autenticación SAML de CloudStack (deshabilitada de forma predeterminada) no exige la verificación de firmas. En entornos de CloudStack donde la autenticación SAML está habilitada, un atacante que inicia la autenticación de inicio de sesión único SAML de CloudStack puede omitir la autenticación SAML enviando una respuesta SAML falsificada sin firma y con un nombre de usuario conocido o adivinado y otros detalles de usuario de un usuario de CloudStack habilitado para SAML. cuenta. En tales entornos, esto puede resultar en un compromiso total de los recursos que posee y/o a los que puede acceder una cuenta de usuario habilitada para SAML. Se recomienda a los usuarios afectados que deshabiliten el complemento de autenticación SAML configurando "saml2.enabled" en configuración global en "false" o actualicen a la versión 4.18.2.2, 4.19.1.0 o posterior, que soluciona este problema.

*Credits: Christian Gross of Netcloud AG, Damon Smith of Apple Services Engineering Security, Adam Pond of Apple Services Engineering Security, Terry Thibault of Apple Services Engineering Security
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
Poc
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2024-07-12 CVE Reserved
  • 2024-07-19 CVE Published
  • 2024-07-23 First Exploit
  • 2024-08-02 CVE Updated
  • 2024-11-21 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-290: Authentication Bypass by Spoofing
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Apache Software Foundation
Search vendor "Apache Software Foundation"
Apache CloudStack
Search vendor "Apache Software Foundation" for product "Apache CloudStack"
>= 4.5.0.0 <= 4.18.2.1
Search vendor "Apache Software Foundation" for product "Apache CloudStack" and version " >= 4.5.0.0 <= 4.18.2.1"
en
Affected
Apache Software Foundation
Search vendor "Apache Software Foundation"
Apache CloudStack
Search vendor "Apache Software Foundation" for product "Apache CloudStack"
>= 4.19.0.0 <= 4.19.0.2
Search vendor "Apache Software Foundation" for product "Apache CloudStack" and version " >= 4.19.0.0 <= 4.19.0.2"
en
Affected