CVE-2024-41107

Scores

EPSS

0.920high92.0%
0%20%40%60%80%100%

Percentile: 92.0%

CVSS

8.1high3.x
0246810

CVSS Score: 8.1/10

All CVSS Scores

CVSS 3.x
8.1

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Description

The CloudStack SAML authentication (disabled by default) does not enforce signature check. In CloudStack environments where SAML authentication is enabled, an attacker that initiates CloudStack SAML single sign-on authentication can bypass SAML authentication by submitting a spoofed SAML response with no signature and known or guessed username and other user details of a SAML-enabled CloudStack user-account. In such environments, this can result in a complete compromise of the resources owned and/or accessible by a SAML enabled user-account.

Affected users are recommended to disable the SAML authentication plugin by setting the ”saml2.enabled” global setting to “false”, or upgrade to version 4.18.2.2, 4.19.1.0 or later, which addresses this issue.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

anchore_overridesnvd

CWEs

CWE-290

Related Vulnerabilities

Exploits

Exploit ID: CVE-2024-41107

Source: github-poc

URL: https://github.com/d0rb/CVE-2024-41107

Vulnerable Software (2)

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:apache:cloudstack:*:*:*:*:*:maven:*:*",          "versionEndExcluding": "4.18.2.2",          "versionStartIncl...

Source: anchore_overrides

Type: Configuration

Vendor: *

Product: cloudstack

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:apache:cloudstack:*:*:*:*:*:*:*:*",      "versionEndExcluding": "4.18.2.2",      "versionStartIncluding": "4.5.0",      "vulnerable": true    ...

Source: nvd

End of list