aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorThomas Zander <riggs@FreeBSD.org>2021-06-04 09:59:47 +0000
committerThomas Zander <riggs@FreeBSD.org>2021-06-04 09:59:47 +0000
commit44ca7573855d48957714ccbe1e0849617ac18915 (patch)
tree41714e123df2980774e50e0d9ce1a713ff59e1a7
parent5d304c338abaef672b8392ff2d2d0b554106950c (diff)
downloadports-44ca7573855d48957714ccbe1e0849617ac18915.tar.gz
ports-44ca7573855d48957714ccbe1e0849617ac18915.zip
security/vuxml: Document CVE-2021-33054 for www/sogo*.
PR: 256374 Reported by: rob2g2 <spam123@bitbert.com>
-rw-r--r--security/vuxml/vuln.xml41
1 files changed, 41 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index d4dc3cc5b5c8..38e8f777ddf3 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -76,6 +76,47 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="69815a1d-c31d-11eb-9633-b42e99a1b9c3">
+ <topic>SOGo -- SAML user authentication impersonation</topic>
+ <affects>
+ <package>
+ <name>sogo</name>
+ <range><lt>5.1.1</lt></range>
+ </package>
+ <package>
+ <name>sogo-activesync</name>
+ <range><lt>5.1.1</lt></range>
+ </package>
+ <package>
+ <name>sogo2</name>
+ <range><lt>2.4.1</lt></range>
+ </package>
+ <package>
+ <name>sogo2-activesync</name>
+ <range><lt>2.4.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>sogo.nu reports:</p>
+ <blockquote cite="https://www.sogo.nu/news/2021/saml-vulnerability.html">
+ <p>SOGo was not validating the signatures of any SAML assertions it received.</p>
+ <p>This means any actor with network access to the deployment could impersonate</p>
+ <p>users when SAML was the authentication method.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2021-33054</cvename>
+ <url>https://www.sogo.nu/news/2021/saml-vulnerability.html</url>
+ <url>https://blogs.akamai.com/2021/06/sogo-and-packetfence-impacted-by-saml-implementation-vulnerabilities.html</url>
+ </references>
+ <dates>
+ <discovery>2021-06-01</discovery>
+ <entry>2021-06-02</entry>
+ </dates>
+ </vuln>
+
<vuln vid="c7855866-c511-11eb-ae1d-b42e991fc52e">
<topic>tauthon -- Regular Expression Denial of Service</topic>
<affects>