In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade Debian:12
opensaml
to version 3.2.1-3+deb12u1 or higher.
Note: Versions mentioned in the description apply only to the upstream opensaml
package and not the opensaml
package as distributed by Debian
.
See How to fix?
for Debian:12
relevant fixed versions and status.
The OpenSAML C++ library before 3.3.1 allows forging of signed SAML messages via parameter manipulation (when using SAML bindings that rely on non-XML signatures).