Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTU2ODQtZzQ4My0yMjQ5
Signature Validation Bypass
Impact
Given a valid SAML Response, an attacker can potentially modify the document, bypassing signature validation in order to pass off the altered document as a signed one.
This enables a variety of attacks, including users accessing accounts other than the one to which they authenticated in the identity provider, or full authentication bypass if an external attacker can obtain an expired, signed SAML Response.
Patches
A patch is available, users of gosaml2 should upgrade to v0.5.0 or higher.
References
See the underlying advisory on goxmldsig for more details.
Permalink: https://github.com/advisories/GHSA-5684-g483-2249JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTU2ODQtZzQ4My0yMjQ5
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: almost 3 years ago
Updated: over 1 year ago
Identifiers: GHSA-5684-g483-2249
References:
- https://github.com/russellhaering/gosaml2/security/advisories/GHSA-5684-g483-2249
- https://github.com/advisories/GHSA-5684-g483-2249
Blast Radius: 0.0
Affected Packages
go:github.com/russellhaering/gosaml2
Dependent packages: 65Dependent repositories: 155
Downloads:
Affected Version Ranges: < 0.5.0
Fixed in: 0.5.0
All affected versions: 0.1.0, 0.2.0, 0.3.0, 0.3.1, 0.4.0
All unaffected versions: 0.5.0, 0.6.0, 0.7.0, 0.8.0, 0.8.1, 0.9.0, 0.9.1