The OIDC OP plugin before 3.0.4 for Shibboleth Identity Provider allows server-side request forgery (SSRF) due to insufficient restriction of the request_uri parameter. This allows attackers to interact with arbitrary third-party HTTP services.
References
Link | Resource |
---|---|
http://shibboleth.net/community/advisories/ | Vendor Advisory |
https://github.com/sbaresearch/advisories/tree/public/2022/SBA-ADV-20220127-01_Shibboleth_IdP_OIDC_OP_Plugin_SSRF | Exploit Third Party Advisory |
http://shibboleth.net/community/advisories/secadv_20220131.txt | Vendor Advisory |
Configurations
Information
Published : 2022-02-04 12:15
Updated : 2022-02-09 05:14
NVD link : CVE-2022-24129
Mitre link : CVE-2022-24129
JSON object : View
CWE
CWE-918
Server-Side Request Forgery (SSRF)
Products Affected
shibboleth
- oidc_op