CVE-2025-46784

7.5 HIGH

📋 TL;DR

A denial-of-service vulnerability in Entr'ouvert Lasso's SAML processing allows attackers to crash the service by sending specially crafted SAML responses. This affects systems using Lasso 2.5.1 for SAML authentication. The vulnerability can be exploited remotely without authentication.

💻 Affected Systems

Products:
  • Entr'ouvert Lasso
Versions: 2.5.1
Operating Systems: All platforms running Lasso
Default Config Vulnerable: ⚠️ Yes
Notes: Any system using Lasso for SAML authentication is vulnerable when processing SAML responses.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service outage of SAML authentication, preventing legitimate users from accessing protected resources.

🟠

Likely Case

Intermittent service disruptions affecting SAML authentication flows, potentially causing login failures.

🟢

If Mitigated

Minimal impact with proper network segmentation and monitoring to detect and block malicious SAML responses.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending a malformed SAML response to the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

1. Monitor vendor channels for patches. 2. Consider upgrading to a newer version if available. 3. Apply workarounds in the meantime.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement input validation to reject malformed SAML responses before they reach Lasso.

# Configure web application firewall rules to filter suspicious SAML responses
# Implement XML schema validation for incoming SAML messages

Rate Limiting

linux

Limit the rate of SAML response processing to prevent rapid exploitation attempts.

# Example using nginx: limit_req_zone $binary_remote_addr zone=saml:10m rate=10r/s;
# Add to location block: limit_req zone=saml burst=20 nodelay;

🧯 If You Can't Patch

  • Implement network segmentation to isolate SAML endpoints from untrusted networks.
  • Deploy intrusion detection systems to monitor for malformed SAML traffic patterns.

🔍 How to Verify

Check if Vulnerable:

Check if Lasso version 2.5.1 is installed and used for SAML processing.

Check Version:

lasso-config --version

Verify Fix Applied:

Verify that workarounds are properly implemented and test with controlled malformed SAML responses.

📡 Detection & Monitoring

Log Indicators:

  • Unusual memory consumption spikes in Lasso processes
  • Repeated authentication failures from SAML endpoints
  • Process crashes or restarts of Lasso services

Network Indicators:

  • Unusually large or malformed SAML responses
  • High volume of SAML requests from single sources

SIEM Query:

source="lasso.log" AND ("memory" OR "crash" OR "error") AND "SAML"

🔗 References

📤 Share & Export