First published: Sun Jun 25 2023(Updated: )
Shibboleth XMLTooling before 3.2.4, as used in OpenSAML and Shibboleth Service Provider, allows SSRF via a crafted KeyInfo element. (This is fixed in, for example, Shibboleth Service Provider 3.4.1.3 on Windows.)
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/xmltooling | <3.2.4-1 | 3.2.4-1 |
ubuntu/xmltooling | <1.5.6-2ubuntu0.3+ | 1.5.6-2ubuntu0.3+ |
debian/xmltooling | <=3.0.4-1+deb10u1 | 3.0.4-1+deb10u2 3.2.0-3+deb11u1 3.2.3-1+deb12u1 3.2.4-2 |
XMLTooling | <3.2.4 | |
Debian Debian Linux | =11.0 | |
Debian Debian Linux | =12.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2023-36661.
The severity of CVE-2023-36661 is high.
Shibboleth XMLTooling before version 3.2.4, used in OpenSAML and Shibboleth Service Provider, is affected by CVE-2023-36661.
The vulnerability can be fixed by updating to a patched version, such as Shibboleth Service Provider 3.4.1.3 on Windows.
You can find more information about CVE-2023-36661 in the following references: [Link 1](https://shibboleth.net/community/advisories/secadv_20230612.txt), [Link 2](https://www.debian.org/security/2023/dsa-5432), [Link 3](https://launchpad.net/bugs/cve/CVE-2023-36661).