{"vulnerability": "CVE-2022-37011", "sightings": [{"uuid": "15ff07ba-a06c-409a-b76f-0609635d44ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37011", "type": "seen", "source": "https://t.me/cibsecurity/52627", "content": "\u203c CVE-2022-44457 \u203c\n\nA vulnerability has been identified in Mendix SAML Module (Mendix 7 compatible) (All versions &lt; V1.17.0), Mendix SAML Module (Mendix 7 compatible) (All versions &gt;= V1.17.0), Mendix SAML Module (Mendix 8 compatible) (All versions &lt; V2.3.0), Mendix SAML Module (Mendix 8 compatible) (All versions &gt;= V2.3.0 &lt; V2.3.2), Mendix SAML Module (Mendix 9 compatible, New Track) (All versions &lt; V3.3.1), Mendix SAML Module (Mendix 9 compatible, New Track) (All versions &gt;= V3.3.1 &lt; V3.3.5), Mendix SAML Module (Mendix 9 compatible, Upgrade Track) (All versions &lt; V3.3.0), Mendix SAML Module (Mendix 9 compatible, Upgrade Track) (All versions &gt;= V3.3.0 &lt; V3.3.4). Affected versions of the module insufficiently protect from packet capture replay, only when the not recommended, non default configuration option `'Allow Idp Initiated Authentication'` is enabled. This CVE entry describes the incomplete fix for CVE-2022-37011 in a specific non default configuration.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-08T14:35:16.000000Z"}]}