{ "id": "CVE-2023-36661", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-25T22:15:21.403", "lastModified": "2023-06-27T08:15:11.477", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Shibboleth XMLTooling before 3.2.4, as used in OpenSAML and Shibboleth Service Provider, allows SSRF via a crafted KeyInfo element. (This is fixed in, for example, Shibboleth Service Provider 3.4.1.3 on Windows.)" } ], "metrics": {}, "references": [ { "url": "https://shibboleth.net/community/advisories/secadv_20230612.txt", "source": "cve@mitre.org" }, { "url": "https://www.debian.org/security/2023/dsa-5432", "source": "cve@mitre.org" } ] }