mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-30 10:10:35 +00:00
21 lines
1.4 KiB
Markdown
21 lines
1.4 KiB
Markdown
### [CVE-2024-41107](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41107)
|
||

|
||

|
||

|
||
|
||
### Description
|
||
|
||
The CloudStack SAML authentication (disabled by default) does not enforce signature check. In CloudStack environments where SAML authentication is enabled, an attacker that initiates CloudStack SAML single sign-on authentication can bypass SAML authentication by submitting a spoofed SAML response with no signature and known or guessed username and other user details of a SAML-enabled CloudStack user-account. In such environments, this can result in a complete compromise of the resources owned and/or accessible by a SAML enabled user-account.Affected users are recommended to disable the SAML authentication plugin by setting the "saml2.enabled" global setting to "false", or upgrade to version 4.18.2.2, 4.19.1.0 or later, which addresses this issue.
|
||
|
||
### POC
|
||
|
||
#### Reference
|
||
No PoCs from references.
|
||
|
||
#### Github
|
||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||
- https://github.com/tanjiti/sec_profile
|
||
- https://github.com/wy876/POC
|
||
- https://github.com/wy876/wiki
|
||
|