Lucene search

K
nvd[email protected]NVD:CVE-2023-25957
HistoryMar 14, 2023 - 10:15 a.m.

CVE-2023-25957

2023-03-1410:15:28
CWE-287
CWE-303
web.nvd.nist.gov
mendix saml
vulnerability
unauthenticated remote attackers
bypass authentication
cve-2023-25957

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

9.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

46.4%

A vulnerability has been identified in Mendix SAML (Mendix 7 compatible) (All versions >= V1.16.4 < V1.17.3), Mendix SAML (Mendix 8 compatible) (All versions >= V2.2.0 < V2.3.0), Mendix SAML (Mendix 9 latest compatible, New Track) (All versions >= V3.1.9 < V3.3.1), Mendix SAML (Mendix 9 latest compatible, Upgrade Track) (All versions >= V3.1.8 < V3.3.0), Mendix SAML (Mendix 9.6 compatible, New Track) (All versions >= V3.1.9 < V3.2.7), Mendix SAML (Mendix 9.6 compatible, Upgrade Track) (All versions >= V3.1.8 < V3.2.6). The affected versions of the module insufficiently verify the SAML assertions. This could allow unauthenticated remote attackers to bypass authentication and get access to the application.

For compatibility reasons, fix versions still contain this issue, but only when the recommended, default configuration option 'Use Encryption' is disabled.

Affected configurations

NVD
Node
mendixsamlRange1.16.41.17.2mendix
OR
mendixsamlRange2.2.02.2.3mendix
OR
mendixsamlRange3.1.93.2.5mendix

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

9.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

46.4%

Related for NVD:CVE-2023-25957