First published: Tue Sep 13 2022(Updated: )
A vulnerability has been identified in Mendix SAML (Mendix 7 compatible) (All versions < V1.17.0), Mendix SAML (Mendix 8 compatible) (All versions < V2.3.0), Mendix SAML (Mendix 9 compatible, New Track) (All versions < V3.3.1), Mendix SAML (Mendix 9 compatible, Upgrade Track) (All versions < V3.3.0). Affected versions of the module insufficiently protect from packet capture replay. This could allow unauthorized remote attackers to bypass authentication and get access to the application. For compatibility reasons, fix versions still contain this issue, but only when the not recommended, non default configuration option `'Allow Idp Initiated Authentication'` is enabled.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mendix | <1.17.0 | |
Mendix | >=2.0.0<2.3.0 | |
Mendix | >=3.0.0<3.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Mendix SAML vulnerability is CVE-2022-37011.
The severity of CVE-2022-37011 is critical with a severity value of 9.8.
Mendix SAML (Mendix 7 compatible) versions prior to V1.17.0, Mendix SAML (Mendix 8 compatible) versions prior to V2.3.0, Mendix SAML (Mendix 9 compatible, New Track) versions prior to V3.3.1, and Mendix SAML (Mendix 9 compatible, Upgrade Track) versions prior to V3.3.0 are affected by this vulnerability.
The Common Weakness Enumeration (CWE) for this vulnerability is CWE-294.
You can find more information about this vulnerability at the following link: [Siemens ProductCERT PDF](https://cert-portal.siemens.com/productcert/pdf/ssa-638652.pdf).