CVE-2021-33054

EUVD-2021-19769
SOGo 2.x before 2.4.1 and 3.x through 5.x before 5.1.1 does not validate the signatures of any SAML assertions it receives. Any actor with network access to the deployment could impersonate users when SAML is the authentication method. (Only versions after 2.0.5a are affected.)
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 52%
Affected Products (NVD)
VendorProductVersion
inversesogo
2.0.6 ≤
𝑥
< 2.4.1
inversesogo
3.0.0 ≤
𝑥
< 5.1.1
debiandebian_linux
9.0
debiandebian_linux
10.0
debiandebian_linux
11.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
sogo
bookworm
5.8.0-1
fixed
bullseye
5.0.1-4+deb11u1
fixed
bullseye (security)
5.0.1-4+deb11u1
fixed
sid
5.11.2-1
fixed
trixie
5.11.2-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
sogo
bionic
needs-triage
focal
needs-triage
groovy
ignored
hirsute
ignored
impish
ignored
jammy
needs-triage
kinetic
ignored
lunar
ignored
mantic
ignored
noble
dne
trusty
dne
xenial
needs-triage