{"vulnerability": "CVE-2022-44457", "sightings": [{"uuid": "934016ac-3b09-4545-ac0c-266d4cd7fd63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44457", "type": "seen", "source": "https://t.me/cibsecurity/52627", "content": "\u203c CVE-2022-44457 \u203c\n\nA vulnerability has been identified in Mendix SAML Module (Mendix 7 compatible) (All versions &lt; V1.17.0), Mendix SAML Module (Mendix 7 compatible) (All versions &gt;= V1.17.0), Mendix SAML Module (Mendix 8 compatible) (All versions &lt; V2.3.0), Mendix SAML Module (Mendix 8 compatible) (All versions &gt;= V2.3.0 &lt; V2.3.2), Mendix SAML Module (Mendix 9 compatible, New Track) (All versions &lt; V3.3.1), Mendix SAML Module (Mendix 9 compatible, New Track) (All versions &gt;= V3.3.1 &lt; V3.3.5), Mendix SAML Module (Mendix 9 compatible, Upgrade Track) (All versions &lt; V3.3.0), Mendix SAML Module (Mendix 9 compatible, Upgrade Track) (All versions &gt;= V3.3.0 &lt; V3.3.4). Affected versions of the module insufficiently protect from packet capture replay, only when the not recommended, non default configuration option `'Allow Idp Initiated Authentication'` is enabled. This CVE entry describes the incomplete fix for CVE-2022-37011 in a specific non default configuration.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-08T14:35:16.000000Z"}]}