Логотип exploitDog
bind:CVE-2025-54419
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-54419

Количество 3

Количество 3

redhat логотип

CVE-2025-54419

5 месяцев назад

A SAML library not dependent on any frameworks that runs in Node. In version 5.0.1, Node-SAML loads the assertion from the (unsigned) original response document. This is different than the parts that are verified when checking signature. This allows an attacker to modify authentication details within a valid SAML assertion. For example, in one attack it is possible to remove any character from the SAML assertion username. To conduct the attack an attacker would need a validly signed document from the identity provider (IdP). This is fixed in version 5.1.0.

CVSS3: 7.4
EPSS: Низкий
nvd логотип

CVE-2025-54419

5 месяцев назад

A SAML library not dependent on any frameworks that runs in Node. In version 5.0.1, Node-SAML loads the assertion from the (unsigned) original response document. This is different than the parts that are verified when checking signature. This allows an attacker to modify authentication details within a valid SAML assertion. For example, in one attack it is possible to remove any character from the SAML assertion username. To conduct the attack an attacker would need a validly signed document from the identity provider (IdP). This is fixed in version 5.1.0.

CVSS3: 10
EPSS: Низкий
github логотип

GHSA-4mxg-3p6v-xgq3

5 месяцев назад

Node-SAML SAML Signature Verification Vulnerability

CVSS3: 10
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2025-54419

A SAML library not dependent on any frameworks that runs in Node. In version 5.0.1, Node-SAML loads the assertion from the (unsigned) original response document. This is different than the parts that are verified when checking signature. This allows an attacker to modify authentication details within a valid SAML assertion. For example, in one attack it is possible to remove any character from the SAML assertion username. To conduct the attack an attacker would need a validly signed document from the identity provider (IdP). This is fixed in version 5.1.0.

CVSS3: 7.4
0%
Низкий
5 месяцев назад
nvd логотип
CVE-2025-54419

A SAML library not dependent on any frameworks that runs in Node. In version 5.0.1, Node-SAML loads the assertion from the (unsigned) original response document. This is different than the parts that are verified when checking signature. This allows an attacker to modify authentication details within a valid SAML assertion. For example, in one attack it is possible to remove any character from the SAML assertion username. To conduct the attack an attacker would need a validly signed document from the identity provider (IdP). This is fixed in version 5.1.0.

CVSS3: 10
0%
Низкий
5 месяцев назад
github логотип
GHSA-4mxg-3p6v-xgq3

Node-SAML SAML Signature Verification Vulnerability

CVSS3: 10
0%
Низкий
5 месяцев назад

Уязвимостей на страницу