First published: Thu Nov 02 2017(Updated: )
OpenAM (Open Source Edition) allows an attacker to bypass authentication and access unauthorized contents via unspecified vectors. Note that this vulnerability affects OpenAM (Open Source Edition) implementations configured as SAML 2.0IdP, and switches authentication methods based on AuthnContext requests sent from the service provider.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
OpenAM | >=9.5.5<=9.5.5-41 | |
OpenAM | >=11.0.0<=11.0.0-112 | |
OpenAM | >=13.0.0<=13.0.0-73 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-10873 is categorized as a critical vulnerability due to its potential for unauthorized access through authentication bypass.
To fix CVE-2017-10873, it is recommended to apply the latest available patches or updates for OpenAM that address this vulnerability.
CVE-2017-10873 affects OpenAM versions from 9.5.5 to 9.5.5-41, 11.0.0 to 11.0.0-112, and 13.0.0 to 13.0.0-73.
CVE-2017-10873 can be exploited by attackers to bypass authentication and gain unauthorized access to protected resources.
Yes, CVE-2017-10873 specifically affects OpenAM implementations configured as SAML 2.0 Identity Providers.