Open Access Management (OpenAM) is an access management solution that includes Authentication, SSO, Authorization, Federation, Entitlements and Web Services Security. OpenAM up to version 14.7.2 does not properly validate the signature of SAML responses received as part of the SAMLv1.x Single Sign-On process. Attackers can use this fact to impersonate any OpenAM user, including the administrator, by sending a specially crafted SAML response to the SAMLPOSTProfileServlet servlet. This problem has been patched in  OpenAM 14.7.3-SNAPSHOT and later. User unable to upgrade should comment servlet `SAMLPOSTProfileServlet` from their pom file. See the linked GHSA for details.
                
            Metrics
Affected Vendors & Products
References
        History
                    Thu, 24 Oct 2024 15:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: GitHub_M
Published: 2023-07-20T16:53:23.977Z
Updated: 2024-10-24T14:53:39.210Z
Reserved: 2023-07-06T13:01:36.998Z
Link: CVE-2023-37471
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-08-02T17:16:30.329Z
 NVD
                        NVD
                    Status : Modified
Published: 2023-07-20T17:15:10.917
Modified: 2024-11-21T08:11:46.770
Link: CVE-2023-37471
 Redhat
                        Redhat
                    No data.