Логотип exploitDog
bind:CVE-2022-39299
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-39299

Количество 2

Количество 2

nvd логотип

CVE-2022-39299

больше 3 лет назад

Passport-SAML is a SAML 2.0 authentication provider for Passport, the Node.js authentication library. A remote attacker may be able to bypass SAML authentication on a website using passport-saml. A successful attack requires that the attacker is in possession of an arbitrary IDP signed XML element. Depending on the IDP used, fully unauthenticated attacks (e.g without access to a valid user) might also be feasible if generation of a signed message can be triggered. Users should upgrade to passport-saml version 3.2.2 or newer. The issue was also present in the beta releases of `node-saml` before version 4.0.0-beta.5. If you cannot upgrade, disabling SAML authentication may be done as a workaround.

CVSS3: 7.4
EPSS: Средний
github логотип

GHSA-m974-647v-whv7

больше 3 лет назад

Signature bypass via multiple root elements

CVSS3: 8.1
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-39299

Passport-SAML is a SAML 2.0 authentication provider for Passport, the Node.js authentication library. A remote attacker may be able to bypass SAML authentication on a website using passport-saml. A successful attack requires that the attacker is in possession of an arbitrary IDP signed XML element. Depending on the IDP used, fully unauthenticated attacks (e.g without access to a valid user) might also be feasible if generation of a signed message can be triggered. Users should upgrade to passport-saml version 3.2.2 or newer. The issue was also present in the beta releases of `node-saml` before version 4.0.0-beta.5. If you cannot upgrade, disabling SAML authentication may be done as a workaround.

CVSS3: 7.4
13%
Средний
больше 3 лет назад
github логотип
GHSA-m974-647v-whv7

Signature bypass via multiple root elements

CVSS3: 8.1
13%
Средний
больше 3 лет назад

Уязвимостей на страницу