CWE
287 1270
Advisory Published
Updated

CVE-2022-31122: Wire-server vulnerable to Token Recipient Confusion resulting in account impersonation, deletion or malicious account creation

First published: Tue Oct 18 2022(Updated: )

Wire is an encrypted communication and collaboration platform. Versions prior to 2022-07-12/Chart 4.19.0 are subject to Token Recipient Confusion. If an attacker has certain details of SAML IdP metadata, and configures their own SAML on the same backend, the attacker can delete all SAML authenticated accounts of a targeted team, Authenticate as a user of the attacked team and create arbitrary accounts in the context of the team if it is not managed by SCIM. This issue is fixed in wire-server 2022-07-12 and is already deployed on all Wire managed services. On-premise instances of wire-server need to be updated to 2022-07-12/Chart 4.19.0, so that their backends are no longer affected. As a workaround, the risk of an attack can be reduced by disabling SAML configuration for teams (galley.config.settings.featureFlags.sso). Helm overrides are located in `values/wire-server/values.yaml` Note that the ability to configure SAML SSO as a team is disabled by default for on-premise installations.

Credit: security-advisories@github.com

Affected SoftwareAffected VersionHow to fix
Wire Wire Server<2022-07-12

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2022-31122?

    The severity of CVE-2022-31122 is critical with a CVSS score of 8.1.

  • What is CVE-2022-31122?

    CVE-2022-31122 is a vulnerability in Wire, an encrypted communication and collaboration platform, that allows an attacker with certain details of SAML IdP metadata to delete all SAML authentications.

  • How does CVE-2022-31122 affect Wire?

    CVE-2022-31122 affects versions of Wire prior to 2022-07-12/Chart 4.19.0 and can be exploited to perform a Token Recipient Confusion attack.

  • How can I fix CVE-2022-31122 in Wire?

    To fix CVE-2022-31122 in Wire, you should update to version 2022-07-12/Chart 4.19.0 or a later version.

  • Where can I find more information about CVE-2022-31122?

    More information about CVE-2022-31122 can be found on the official GitHub security advisory page: [https://github.com/wireapp/wire-server/security/advisories/GHSA-gq27-gmgq-fmxw](https://github.com/wireapp/wire-server/security/advisories/GHSA-gq27-gmgq-fmxw)

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203