Логотип exploitDog
bind:CVE-2022-23505
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-23505

Количество 2

Количество 2

nvd логотип

CVE-2022-23505

около 3 лет назад

Passport-wsfed-saml2 is a ws-federation protocol and SAML2 tokens authentication provider for Passport. In versions prior to 4.6.3, a remote attacker may be able to bypass WSFed authentication on a website using passport-wsfed-saml2. A successful attack requires that the attacker is in possession of an arbitrary IDP signed assertion. Depending on the IDP used, fully unauthenticated attacks (e.g without access to a valid user) might also be feasible if generation of a signed message can be triggered. This issue is patched in version 4.6.3. Use of SAML2 authentication instead of WSFed is a workaround.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-ppjq-qxhx-m25f

около 3 лет назад

Authentication Bypass for passport-wsfed-saml2

CVSS3: 5.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-23505

Passport-wsfed-saml2 is a ws-federation protocol and SAML2 tokens authentication provider for Passport. In versions prior to 4.6.3, a remote attacker may be able to bypass WSFed authentication on a website using passport-wsfed-saml2. A successful attack requires that the attacker is in possession of an arbitrary IDP signed assertion. Depending on the IDP used, fully unauthenticated attacks (e.g without access to a valid user) might also be feasible if generation of a signed message can be triggered. This issue is patched in version 4.6.3. Use of SAML2 authentication instead of WSFed is a workaround.

CVSS3: 5.3
0%
Низкий
около 3 лет назад
github логотип
GHSA-ppjq-qxhx-m25f

Authentication Bypass for passport-wsfed-saml2

CVSS3: 5.3
0%
Низкий
около 3 лет назад

Уязвимостей на страницу