First published: Tue Jun 14 2022(Updated: )
SysAid - Okta SSO integration - was found vulnerable to XML External Entity Injection vulnerability. Any SysAid environment that uses the Okta SSO integration might be vulnerable. An unauthenticated attacker could exploit the XXE vulnerability by sending a malformed POST request to the identity provider endpoint. An attacker can extract the identity provider endpoint by decoding the SAMLRequest parameter's value and searching for the AssertionConsumerServiceURL parameter's value. It often allows an attacker to view files on the application server filesystem and interact with any back-end or external systems that the application can access. In some situations, an attacker can escalate an XXE attack to compromise the underlying server or other back-end infrastructure by leveraging the XXE vulnerability to perform server-side request forgery (SSRF) attacks.
Credit: cna@cyber.gov.il
Affected Software | Affected Version | How to fix |
---|---|---|
SysAid | >=22.1.49<=22.1.63 |
Update to 22.1.50 cloud version, or to 22.1.64 on premise version.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2022-23170.
The severity of CVE-2022-23170 is critical.
The SysAid Okta SSO integration software is affected by CVE-2022-23170.
An unauthenticated attacker can exploit CVE-2022-23170 by sending a malformed POST request to the identity provider.
Yes, a fix is available for CVE-2022-23170. Update the affected SysAid Okta SSO integration software to version 22.1.63 or higher.