The OIDC OP plugin before 3.0.4 for Shibboleth Identity Provider allows server-side request forgery (SSRF) due to insufficient restriction of the request_uri parameter. This allows attackers to interact with arbitrary third-party HTTP services.
References
Link | Resource |
---|---|
http://shibboleth.net/community/advisories/ | Vendor Advisory |
http://shibboleth.net/community/advisories/secadv_20220131.txt | Vendor Advisory |
https://github.com/sbaresearch/advisories/tree/public/2022/SBA-ADV-20220127-01_Shibboleth_IdP_OIDC_OP_Plugin_SSRF | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2022-02-04 20:15
Updated : 2022-02-09 13:14
NVD link : CVE-2022-24129
Mitre link : CVE-2022-24129
CVE.ORG link : CVE-2022-24129
JSON object : View
Products Affected
shibboleth
- oidc_op
CWE
CWE-918
Server-Side Request Forgery (SSRF)