### [CVE-2024-41107](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41107) ![](https://img.shields.io/static/v1?label=Product&message=Apache%20CloudStack&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=4.5.0%3C%3D%204.18.2.1%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-290%20Authentication%20Bypass%20by%20Spoofing&color=brighgreen) ### Description The CloudStack SAML authentication (disabled by default) does not enforce signature check. In CloudStack environments where SAML authentication is enabled, an attacker that initiates CloudStack SAML single sign-on authentication can bypass SAML authentication by submitting a spoofed SAML response with no signature and known or guessed username and other user details of a SAML-enabled CloudStack user-account. In such environments, this can result in a complete compromise of the resources owned and/or accessible by a SAML enabled user-account.Affected users are recommended to disable the SAML authentication plugin by setting the "saml2.enabled" global setting to "false", or upgrade to version 4.18.2.2, 4.19.1.0 or later, which addresses this issue. ### POC #### Reference No PoCs from references. #### Github - https://github.com/ibaiw/2024Hvv - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/tanjiti/sec_profile - https://github.com/wy876/POC - https://github.com/wy876/wiki