CVE-2025-46705

7.5 HIGH

📋 TL;DR

A denial of service vulnerability in Entr'ouvert Lasso's g_assert_not_reached function allows attackers to crash applications by sending specially crafted SAML assertion responses. This affects systems using Lasso 2.5.1 and 2.8.2 for SAML authentication. Organizations using these versions for identity management are vulnerable.

💻 Affected Systems

Products:
  • Entr'ouvert Lasso
Versions: 2.5.1 and 2.8.2
Operating Systems: All platforms running affected Lasso versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using Lasso for SAML processing; other configurations are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption for applications relying on Lasso for SAML authentication, potentially affecting user access to critical systems.

🟠

Likely Case

Application crashes or hangs when processing malicious SAML responses, causing temporary authentication failures.

🟢

If Mitigated

Limited impact with proper network filtering and monitoring; potential brief service interruptions.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Attack requires sending malformed SAML responses to vulnerable endpoints; no authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for patched versions

Vendor Advisory: https://talosintelligence.com/vulnerability_reports/TALOS-2025-2196

Restart Required: Yes

Instructions:

1. Check current Lasso version. 2. Apply vendor-recommended patch or upgrade. 3. Restart affected services. 4. Verify fix implementation.

🔧 Temporary Workarounds

Network Filtering

all

Block or filter incoming SAML responses at network perimeter

Input Validation

all

Implement additional SAML response validation before passing to Lasso

🧯 If You Can't Patch

  • Implement network-level filtering to block suspicious SAML traffic
  • Deploy WAF rules to detect and block malformed SAML assertions

🔍 How to Verify

Check if Vulnerable:

Check Lasso version: lasso-config --version or examine package manager

Check Version:

lasso-config --version || dpkg -l | grep lasso || rpm -qa | grep lasso

Verify Fix Applied:

Verify version is updated and test with valid SAML responses

📡 Detection & Monitoring

Log Indicators:

  • Application crashes
  • Unexpected g_assert_not_reached errors
  • SAML processing failures

Network Indicators:

  • Malformed SAML responses
  • Repeated authentication failures from single source

SIEM Query:

source="application_logs" AND ("g_assert_not_reached" OR "SAML processing error")

🔗 References

📤 Share & Export