.. / CVE-2022-24129

Exploit for Shibboleth OIDC OP <3.0.4 - Server-Side Request Forgery (CVE-2022-24129)

Description:

The Shibboleth Identity Provider OIDC OP plugin before 3.0.4 is vulnerable to server-side request forgery (SSRF) due to insufficient restriction of the request_uri parameter, which allows attackers to interact with arbitrary third-party HTTP services.

Nuclei Template

View the template here CVE-2022-24129.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2022/CVE-2022-24129.yaml
Copy

References:

http://shibboleth.net/community/advisories/
http://shibboleth.net/community/advisories/secadv_20220131.txt
https://github.com/sbaresearch/advisories/tree/public/2022/SBA-ADV-20220127-01_Shibboleth_IdP_OIDC_OP_Plugin_SSRF
https://nvd.nist.gov/vuln/detail/CVE-2022-24129
https://shibboleth.atlassian.net/wiki/spaces/IDPPLUGINS/pages/1376878976/OIDC+OP