CVE-2025-47151
📋 TL;DR
A type confusion vulnerability in Entr'ouvert Lasso's SAML parsing allows remote code execution when processing malicious SAML responses. This affects systems using Lasso 2.5.1 and 2.8.2 for SAML authentication. Attackers can exploit this without authentication to execute arbitrary code on vulnerable servers.
💻 Affected Systems
- Entr'ouvert Lasso
📦 What is this software?
Lasso by Entrouvert
Lasso by Entrouvert
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise with attacker gaining root/admin privileges, data exfiltration, and persistent backdoor installation.
Likely Case
Remote code execution leading to service disruption, credential theft, and lateral movement within the network.
If Mitigated
Limited impact with proper network segmentation, but still potential for service disruption if exploited.
🎯 Exploit Status
Exploitation requires sending a specially crafted SAML response to a vulnerable endpoint.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check vendor advisory for patched versions
Vendor Advisory: https://talosintelligence.com/vulnerability_reports/TALOS-2025-2193
Restart Required: Yes
Instructions:
1. Check current Lasso version. 2. Apply vendor-provided patch or upgrade to fixed version. 3. Restart affected services. 4. Verify fix is applied.
🔧 Temporary Workarounds
Network Filtering
allBlock or filter incoming SAML responses at network perimeter
Load Balancer Rules
allConfigure WAF or load balancer to inspect and block malformed SAML responses
🧯 If You Can't Patch
- Isolate vulnerable systems from internet and restrict network access
- Implement strict input validation for SAML responses at application layer
🔍 How to Verify
Check if Vulnerable:
Check Lasso version: lasso-config --version or check installed package version
Check Version:
lasso-config --version || dpkg -l | grep lasso || rpm -qa | grep lasso
Verify Fix Applied:
Verify version is updated and test SAML functionality remains operational
📡 Detection & Monitoring
Log Indicators:
- SAML parsing errors
- Unexpected process crashes
- Unusual memory allocation patterns
Network Indicators:
- Malformed SAML responses
- Unexpected XML structure in authentication requests
SIEM Query:
source="*lasso*" AND (error OR crash OR "malformed" OR "SAML")