Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5p8w-2mvw-38pv

Опубликовано: 12 окт. 2022
Источник: github
Github: Прошло ревью
CVSS3: 8.1

Описание

Signature bypass via multiple root elements

Impact

A remote attacker may be able to bypass SAML authentication on a website using passport-saml. A successful attack requires that the attacker is in possession of an arbitrary IDP signed XML element. Depending on the IDP used, fully unauthenticated attacks (e.g without access to a valid user) might also be feasible if generation of a signed message can be triggered.

Patches

Users should upgrade to node-saml v4.0.0-beta5 or newer.

Workarounds

Disable SAML authentication.

References

Are there any links users can visit to find out more?

For more information

If you have any questions or comments about this advisory:

Credits

  • Felix Wilhelm of Google Project Zero

Пакеты

Наименование

node-saml

npm
Затронутые версииВерсия исправления

< 4.0.0-beta.5

4.0.0-beta.5

EPSS

Процентиль: 36%
0.00153
Низкий

8.1 High

CVSS3

Дефекты

CWE-347

Связанные уязвимости

CVSS3: 7.7
nvd
больше 3 лет назад

node SAML is a SAML 2.0 library based on the SAML implementation of passport-saml. A remote attacker may be able to bypass SAML authentication on a website using passport-saml. A successful attack requires that the attacker is in possession of an arbitrary IDP signed XML element. Depending on the IDP used, fully unauthenticated attacks (e.g without access to a valid user) might also be feasible if generation of a signed message can be triggered. Users should upgrade to node-saml version 4.0.0-beta5 or newer. Disabling SAML authentication may be done as a workaround.

EPSS

Процентиль: 36%
0.00153
Низкий

8.1 High

CVSS3

Дефекты

CWE-347