Vulnerability Description
An XXE issue was discovered in Morpheus through 5.2.16 and 5.4.x through 5.4.4. A successful attack requires a SAML identity provider to be configured. In order to exploit the vulnerability, the attacker must know the unique SAML callback ID of the configured identity source. A remote attacker can send a request crafted with an XXE payload to invoke a malicious DTD hosted on a system that they control. This results in reading local files that the application has access to.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Morpheusdata | Morpheus | <= 5.2.16 |
Related Weaknesses (CWE)
References
- https://docs.morpheusdata.com/en/5.4.4/release_notes/current.htmlRelease NotesVendor Advisory
- https://support.morpheusdata.com/s/?language=en_USNot ApplicableVendor Advisory
- https://docs.morpheusdata.com/en/5.4.4/release_notes/current.htmlRelease NotesVendor Advisory
- https://support.morpheusdata.com/s/?language=en_USNot ApplicableVendor Advisory
FAQ
What is CVE-2022-31261?
CVE-2022-31261 is a vulnerability with a CVSS score of 7.5 (HIGH). An XXE issue was discovered in Morpheus through 5.2.16 and 5.4.x through 5.4.4. A successful attack requires a SAML identity provider to be configured. In order to exploit the vulnerability, the attac...
How severe is CVE-2022-31261?
CVE-2022-31261 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-31261?
Check the references section above for vendor advisories and patch information. Affected products include: Morpheusdata Morpheus.