CVE-2024-41107
Apache CloudStack: SAML Signature Exclusion
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
The CloudStack SAML authentication (disabled by default) does not enforce signature check. In CloudStack environments where SAML authentication is enabled, an attacker that initiates CloudStack SAML single sign-on authentication can bypass SAML authentication by submitting a spoofed SAML response with no signature and known or guessed username and other user details of a SAML-enabled CloudStack user-account. In such environments, this can result in a complete compromise of the resources owned and/or accessible by a SAML enabled user-account.
Affected users are recommended to disable the SAML authentication plugin by setting the "saml2.enabled" global setting to "false", or upgrade to version 4.18.2.2, 4.19.1.0 or later, which addresses this issue.
La autenticación SAML de CloudStack (deshabilitada de forma predeterminada) no exige la verificación de firmas. En entornos de CloudStack donde la autenticación SAML está habilitada, un atacante que inicia la autenticación de inicio de sesión único SAML de CloudStack puede omitir la autenticación SAML enviando una respuesta SAML falsificada sin firma y con un nombre de usuario conocido o adivinado y otros detalles de usuario de un usuario de CloudStack habilitado para SAML. cuenta. En tales entornos, esto puede resultar en un compromiso total de los recursos que posee y/o a los que puede acceder una cuenta de usuario habilitada para SAML. Se recomienda a los usuarios afectados que deshabiliten el complemento de autenticación SAML configurando "saml2.enabled" en configuración global en "false" o actualicen a la versión 4.18.2.2, 4.19.1.0 o posterior, que soluciona este problema.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2024-07-12 CVE Reserved
- 2024-07-19 CVE Published
- 2024-07-23 First Exploit
- 2024-08-02 CVE Updated
- 2024-11-21 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-290: Authentication Bypass by Spoofing
CAPEC
References (7)
URL | Date | SRC |
---|---|---|
https://github.com/d0rb/CVE-2024-41107 | 2024-07-23 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://cloudstack.apache.org/blog/security-release-advisory-cve-2024-41107 | 2024-07-19 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Apache Software Foundation Search vendor "Apache Software Foundation" | Apache CloudStack Search vendor "Apache Software Foundation" for product "Apache CloudStack" | >= 4.5.0.0 <= 4.18.2.1 Search vendor "Apache Software Foundation" for product "Apache CloudStack" and version " >= 4.5.0.0 <= 4.18.2.1" | en |
Affected
| ||||||
Apache Software Foundation Search vendor "Apache Software Foundation" | Apache CloudStack Search vendor "Apache Software Foundation" for product "Apache CloudStack" | >= 4.19.0.0 <= 4.19.0.2 Search vendor "Apache Software Foundation" for product "Apache CloudStack" and version " >= 4.19.0.0 <= 4.19.0.2" | en |
Affected
|