Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTU2ODQtZzQ4My0yMjQ5

Signature Validation Bypass

Impact

Given a valid SAML Response, an attacker can potentially modify the document, bypassing signature validation in order to pass off the altered document as a signed one.

This enables a variety of attacks, including users accessing accounts other than the one to which they authenticated in the identity provider, or full authentication bypass if an external attacker can obtain an expired, signed SAML Response.

Patches

A patch is available, users of gosaml2 should upgrade to v0.5.0 or higher.

References

See the underlying advisory on goxmldsig for more details.

Permalink: https://github.com/advisories/GHSA-5684-g483-2249
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTU2ODQtZzQ4My0yMjQ5
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: almost 3 years ago
Updated: over 1 year ago


Identifiers: GHSA-5684-g483-2249
References: Repository: https://github.com/russellhaering/gosaml2
Blast Radius: 0.0

Affected Packages

go:github.com/russellhaering/gosaml2
Dependent packages: 65
Dependent repositories: 155
Downloads:
Affected Version Ranges: < 0.5.0
Fixed in: 0.5.0
All affected versions: 0.1.0, 0.2.0, 0.3.0, 0.3.1, 0.4.0
All unaffected versions: 0.5.0, 0.6.0, 0.7.0, 0.8.0, 0.8.1, 0.9.0, 0.9.1