CVE-2024-41107

The CloudStack SAML authentication (disabled by default) does not enforce signature check. In CloudStack environments where SAML authentication is enabled, an attacker that initiates CloudStack SAML single sign-on authentication can bypass SAML authentication by submitting a spoofed SAML response with no signature and known or guessed username and other user details of a SAML-enabled CloudStack user-account. In such environments, this can result in a complete compromise of the resources owned and/or accessible by a SAML enabled user-account. Affected users are recommended to disable the SAML authentication plugin by setting the "saml2.enabled" global setting to "false", or upgrade to version 4.18.2.2, 4.19.1.0 or later, which addresses this issue.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:cloudstack:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:cloudstack:*:*:*:*:*:*:*:*

History

13 Feb 2025, 18:18

Type Values Removed Values Added
CWE CWE-290
Summary The CloudStack SAML authentication (disabled by default) does not enforce signature check. In CloudStack environments where SAML authentication is enabled, an attacker that initiates CloudStack SAML single sign-on authentication can bypass SAML authentication by submitting a spoofed SAML response with no signature and known or guessed username and other user details of a SAML-enabled CloudStack user-account. In such environments, this can result in a complete compromise of the resources owned and/or accessible by a SAML enabled user-account. Affected users are recommended to disable the SAML authentication plugin by setting the "saml2.enabled" global setting to "false", or upgrade to version 4.18.2.2, 4.19.1.0 or later, which addresses this issue. The CloudStack SAML authentication (disabled by default) does not enforce signature check. In CloudStack environments where SAML authentication is enabled, an attacker that initiates CloudStack SAML single sign-on authentication can bypass SAML authentication by submitting a spoofed SAML response with no signature and known or guessed username and other user details of a SAML-enabled CloudStack user-account. In such environments, this can result in a complete compromise of the resources owned and/or accessible by a SAML enabled user-account. Affected users are recommended to disable the SAML authentication plugin by setting the "saml2.enabled" global setting to "false", or upgrade to version 4.18.2.2, 4.19.1.0 or later, which addresses this issue.

10 Sep 2024, 14:30

Type Values Removed Values Added
References () https://www.shapeblue.com/shapeblue-security-advisory-apache-cloudstack-cve-2024-41107 - () https://www.shapeblue.com/shapeblue-security-advisory-apache-cloudstack-cve-2024-41107 - Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2024/07/19/2 - () http://www.openwall.com/lists/oss-security/2024/07/19/2 - Mailing List, Third Party Advisory
References () https://cloudstack.apache.org/blog/security-release-advisory-cve-2024-41107 - () https://cloudstack.apache.org/blog/security-release-advisory-cve-2024-41107 - Mitigation, Vendor Advisory
References () https://github.com/apache/cloudstack/issues/4519 - () https://github.com/apache/cloudstack/issues/4519 - Issue Tracking
References () http://www.openwall.com/lists/oss-security/2024/07/19/1 - () http://www.openwall.com/lists/oss-security/2024/07/19/1 - Mailing List, Third Party Advisory
References () https://lists.apache.org/thread/5q06g8zvmhcw6w3tjr6r5prqdw6zckg3 - () https://lists.apache.org/thread/5q06g8zvmhcw6w3tjr6r5prqdw6zckg3 - Mailing List, Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.1
First Time Apache
Apache cloudstack
CPE cpe:2.3:a:apache:cloudstack:*:*:*:*:*:*:*:*

19 Jul 2024, 14:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/07/19/2 -
  • () http://www.openwall.com/lists/oss-security/2024/07/19/1 -

19 Jul 2024, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-19 11:15

Updated : 2025-03-19 19:15


NVD link : CVE-2024-41107

Mitre link : CVE-2024-41107


JSON object : View

Products Affected

apache

  • cloudstack
CWE

No CWE.