8.8
CVSSv3

CVE-2021-43999

Published: 11/01/2022 Updated: 14/01/2022
CVSS v2 Base Score: 6 | Impact Score: 6.4 | Exploitability Score: 6.8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 534
Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P

Vulnerability Summary

Apache Guacamole 1.2.0 and 1.3.0 do not properly validate responses received from a SAML identity provider. If SAML support is enabled, this may allow a malicious user to assume the identity of another Guacamole user.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache guacamole 1.2.0

apache guacamole 1.3.0

Vendor Advisories

Debian Bug report logs - #1015986 guacamole-client: CVE-2021-41767 CVE-2021-43999 CVE-2020-11997 Package: src:guacamole-client; Maintainer for src:guacamole-client is Debian Remote Maintainers <pkg-remote-team@listsaliothdebianorg>; Reported by: Moritz Mühlenhoff <jmm@inutilorg> Date: Sun, 24 Jul 2022 19:03:01 UT ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> [SECURITY] CVE-2021-43999: Apache Guacamole: Improper validation of SAML responses <!--X-Subject-Header-End--> <!--X-Head-of-M ...