Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-41912

Опубликовано: 28 нояб. 2022
Источник: debian
EPSS Низкий

Описание

The crewjam/saml go library prior to version 0.4.9 is vulnerable to an authentication bypass when processing SAML responses containing multiple Assertion elements. This issue has been corrected in version 0.4.9. There are no workarounds other than upgrading to a fixed version.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
golang-github-crewjam-samlfixed0.4.10-1package

Примечания

  • https://github.com/crewjam/saml/security/advisories/GHSA-j2jp-wvqg-wc2g

  • https://github.com/crewjam/saml/commit/aee3fb1edeeaf1088fcb458727e0fd863d277f8b (v0.4.9)

  • https://bugs.chromium.org/p/project-zero/issues/detail?id=2368

EPSS

Процентиль: 50%
0.00273
Низкий

Связанные уязвимости

CVSS3: 9.1
ubuntu
около 3 лет назад

The crewjam/saml go library prior to version 0.4.9 is vulnerable to an authentication bypass when processing SAML responses containing multiple Assertion elements. This issue has been corrected in version 0.4.9. There are no workarounds other than upgrading to a fixed version.

CVSS3: 9.1
redhat
около 3 лет назад

The crewjam/saml go library prior to version 0.4.9 is vulnerable to an authentication bypass when processing SAML responses containing multiple Assertion elements. This issue has been corrected in version 0.4.9. There are no workarounds other than upgrading to a fixed version.

CVSS3: 9.1
nvd
около 3 лет назад

The crewjam/saml go library prior to version 0.4.9 is vulnerable to an authentication bypass when processing SAML responses containing multiple Assertion elements. This issue has been corrected in version 0.4.9. There are no workarounds other than upgrading to a fixed version.

CVSS3: 9.1
github
около 3 лет назад

crewjam/saml vulnerable to signature bypass via multiple Assertion elements due to improper authentication

EPSS

Процентиль: 50%
0.00273
Низкий