CVE-2021-33054
Summary
| CVE | CVE-2021-33054 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-06-04 15:15:00 UTC |
| Updated | 2022-03-29 16:38:00 UTC |
| Description | SOGo 2.x before 2.4.1 and 3.x through 5.x before 5.1.1 does not validate the signatures of any SAML assertions it receives. Any actor with network access to the deployment could impersonate users when SAML is the authentication method. (Only versions after 2.0.5a are affected.) |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Debian -- Security Information -- DSA-5029-1 sogo |
DEBIAN |
www.debian.org |
|
| sogo/CHANGELOG.md at master · inverse-inc/sogo · GitHub |
MISC |
github.com |
|
| [SECURITY] [DLA 2707-1] sogo security update |
MLIST |
lists.debian.org |
|
| News |
MISC |
www.sogo.nu |
|
| SOGo and PacketFence Impacted by SAML Implementation Vulnerabilities - The Akamai Blog |
MISC |
blogs.akamai.com |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 178703 Debian Security Update for sogo (DLA 2707-1)
- 178951 Debian Security Update for sogo (DSA 5029-1)
- 182833 Debian Security Update for sogo (CVE-2021-33054)
- 690116 Free Berkeley Software Distribution (FreeBSD) Security Update for sogo (69815a1d-c31d-11eb-9633-b42e99a1b9c3)