CVE-2024-41667
CVSS V2 None
CVSS V3 None
Description
OpenAM is an open access management solution. In versions 15.0.3 and prior, the `getCustomLoginUrlTemplate` method in RealmOAuth2ProviderSettings.java is vulnerable to template injection due to its usage of user input. Although the developer intended to implement a custom URL for handling login to override the default PingOne Advanced Identity Cloud login page,they did not restrict the `CustomLoginUrlTemplate`, allowing it to be set freely. Commit fcb8432aa77d5b2e147624fe954cb150c568e0b8 introduces `TemplateClassResolver.SAFER_RESOLVER` to disable the resolution of commonly exploited classes in FreeMarker template injection. As of time of publication, this fix is expected to be part of version 15.0.4.
Overview
- CVE ID
- CVE-2024-41667
- Assigner
- GitHub_M
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-07-24T17:29:58.564Z
- Last Modified Date
- 2024-07-24T17:29:58.564Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://github.com/OpenIdentityPlatform/OpenAM/security/advisories/GHSA-7726-43hg-m23v | x_refsource_CONFIRM |
https://github.com/OpenIdentityPlatform/OpenAM/commit/fcb8432aa77d5b2e147624fe954cb150c568e0b8 | x_refsource_MISC |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-41667 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41667 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-07-25 13:04:42 | Added to TrackCVE |