Overview
- Description
- OpenAM (Open Source Edition) allows an attacker to bypass authentication and access unauthorized contents via unspecified vectors. Note that this vulnerability affects OpenAM (Open Source Edition) implementations configured as SAML 2.0IdP, and switches authentication methods based on AuthnContext requests sent from the service provider.
- Source
- vultures@jpcert.or.jp
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 8.1
- Impact score
- 5.9
- Exploitability score
- 2.2
- Vector string
- CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 6.8
- Impact score
- 6.4
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-287
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:osstech:openam:*:*:*:*:open_source:*:*:*", "vulnerable": true, "matchCriteriaId": "92D277D6-F0B8-4CA0-9413-3873D4412EC1", "versionEndIncluding": "9.5.5-41", "versionStartIncluding": "9.5.5" }, { "criteria": "cpe:2.3:a:osstech:openam:*:*:*:*:open_source:*:*:*", "vulnerable": true, "matchCriteriaId": "861FEB9D-6CBF-4AA8-8A18-811CDC9C8C65", "versionEndIncluding": "11.0.0-112", "versionStartIncluding": "11.0.0" }, { "criteria": "cpe:2.3:a:osstech:openam:*:*:*:*:open_source:*:*:*", "vulnerable": true, "matchCriteriaId": "7E1CC3FF-812B-4562-A2C7-04CF6086EA79", "versionEndIncluding": "13.0.0-73", "versionStartIncluding": "13.0.0" } ], "operator": "OR" } ] } ]