Improper Authentication Affecting org.openidentityplatform.openam:openam-federation-library package, versions [,14.7.3)


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.19% (58th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Authentication vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGOPENIDENTITYPLATFORMOPENAM-5798505
  • published21 Jul 2023
  • disclosed21 Jul 2023
  • creditatorralba

Introduced: 21 Jul 2023

CVE-2023-37471  (opens in a new tab)
CWE-287  (opens in a new tab)

How to fix?

Upgrade org.openidentityplatform.openam:openam-federation-library to version 14.7.3 or higher.

Overview

Affected versions of this package are vulnerable to Improper Authentication due to not properly validating the signature of SAML responses received as part of the SAMLv1.x Single Sign-On process. Attackers can use this fact to impersonate any OpenAM user, including the administrator, by sending a specially crafted SAML response to the SAMLPOSTProfileServlet servlet.

Workaround

Users who are unable to upgrade to the fixed version should comment servlet SAMLPOSTProfileServlet from their pom file.

CVSS Scores

version 3.1