Overview
- Description
- Passport-SAML is a SAML 2.0 authentication provider for Passport, the Node.js authentication library. A remote attacker may be able to bypass SAML authentication on a website using passport-saml. A successful attack requires that the attacker is in possession of an arbitrary IDP signed XML element. Depending on the IDP used, fully unauthenticated attacks (e.g without access to a valid user) might also be feasible if generation of a signed message can be triggered. Users should upgrade to passport-saml version 3.2.2 or newer. The issue was also present in the beta releases of `node-saml` before version 4.0.0-beta.5. If you cannot upgrade, disabling SAML authentication may be done as a workaround.
- Source
- security-advisories@github.com
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 8.1
- Impact score
- 5.9
- Exploitability score
- 2.2
- Vector string
- CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:passport-saml_project:passport-saml:*:*:*:*:*:node.js:*:*", "vulnerable": true, "matchCriteriaId": "680B07BB-E2C0-4DD8-8C49-256652B31CAF", "versionEndExcluding": "3.2.2" }, { "criteria": "cpe:2.3:a:passport-saml_project:passport-saml:4.0.0:beta1:*:*:*:node.js:*:*", "vulnerable": true, "matchCriteriaId": "975F4B3F-A8E6-4241-ACBB-196E069D8852" }, { "criteria": "cpe:2.3:a:passport-saml_project:passport-saml:4.0.0:beta2:*:*:*:node.js:*:*", "vulnerable": true, "matchCriteriaId": "03328340-AE1A-4E9B-94A6-A377B1947176" }, { "criteria": "cpe:2.3:a:passport-saml_project:passport-saml:4.0.0:beta3:*:*:*:node.js:*:*", "vulnerable": true, "matchCriteriaId": "18EB32E2-7824-4A22-A58A-6DEEAB02E3AD" }, { "criteria": "cpe:2.3:a:passport-saml_project:passport-saml:4.0.0:beta4:*:*:*:node.js:*:*", "vulnerable": true, "matchCriteriaId": "DF4C6124-FB33-4682-B68E-2D0341DB3B81" } ], "operator": "OR" } ] } ]