5
CVSSv2

CVE-2021-33054

Published: 04/06/2021 Updated: 29/03/2022
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

SOGo 2.x prior to 2.4.1 and 3.x up to and including 5.x prior to 5.1.1 does not validate the signatures of any SAML assertions it receives. Any actor with network access to the deployment could impersonate users when SAML is the authentication method. (Only versions after 2.0.5a are affected.)

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

inverse sogo

debian debian linux 9.0

debian debian linux 10.0

debian debian linux 11.0

Vendor Advisories

Debian Bug report logs - #989479 sogo: CVE-2021-33054 Package: src:sogo; Maintainer for src:sogo is Debian SOGo Maintainers <pkg-sogo-maintainers@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 4 Jun 2021 21:09:02 UTC Severity: grave Tags: security, upstream Found in versi ...
It was discovered that missing SAML signature validation in the SOGo groupware could result in impersonation attacks For the oldstable distribution (buster), this problem has been fixed in version 407-1+deb10u2 For the stable distribution (bullseye), this problem has been fixed in version 501-4+deb11u1 We recommend that you upgrade your sogo ...