CVE Vulnerabilities

CVE-2022-41912

Improper Authentication

Published: Nov 28, 2022 | Modified: Nov 21, 2024
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
9.1 CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

The crewjam/saml go library prior to version 0.4.9 is vulnerable to an authentication bypass when processing SAML responses containing multiple Assertion elements. This issue has been corrected in version 0.4.9. There are no workarounds other than upgrading to a fixed version.

Weakness

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Affected Software

NameVendorStart VersionEnd Version
SamlSaml_project*0.4.9 (excluding)
Red Hat Advanced Cluster Management for Kubernetes 2.7 for RHEL 8RedHatrhacm2/acm-grafana-rhel8:v2.7.0-19*
Red Hat Ceph Storage 6.1RedHatrhceph/rhceph-6-dashboard-rhel9:6-75*
Red Hat OpenShift Container Platform 4.10RedHatopenshift4/ose-grafana:v4.10.0-202301040925.p0.gca476d4.assembly.stream*
Red Hat OpenShift Container Platform 4.11RedHatopenshift4/ose-grafana:v4.11.0-202212190555.p0.gbc05ec1.assembly.stream*
Red Hat OpenShift Container Platform 4.8RedHatopenshift4/ose-grafana:v4.8.0-202301100925.p0.g7156d02.assembly.stream*
Red Hat OpenShift Container Platform 4.9RedHatopenshift4/ose-grafana:v4.9.0-202301301454.p0.g06135eb.assembly.stream*
Golang-github-crewjam-samlUbuntuesm-apps/jammy*
Golang-github-crewjam-samlUbuntujammy*
Golang-github-crewjam-samlUbuntukinetic*
Golang-github-crewjam-samlUbuntulunar*
Golang-github-crewjam-samlUbuntumantic*
Golang-github-crewjam-samlUbuntutrusty*
Golang-github-crewjam-samlUbuntuupstream*
Golang-github-crewjam-samlUbuntuxenial*

Potential Mitigations

References