Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXczd2YtY2Z4My02Z2N4

SAML authentication vulnerability due to stdlib XML parsing

Impact

Due to issues in Go's standard library XML parsing, a valid SAML response may be mutated by an attacker to modify the trusted document. This can result in allowing unverified logins from a SAML IdP.

Users that configure Fleet with SSO login may be vulnerable to this issue.

Patches

This issue is patched in 3.5.1 using https://github.com/mattermost/xml-roundtrip-validator.

Workarounds

If upgrade to 3.5.1 is not possible, users should disable SSO authentication in Fleet.

References

See https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/ for more information about the underlying vulnerabilities.

For more information

If you have any questions or comments about this advisory:

Permalink: https://github.com/advisories/GHSA-w3wf-cfx3-6gcx
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXczd2YtY2Z4My02Z2N4
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 2 years ago
Updated: about 1 year ago


Identifiers: GHSA-w3wf-cfx3-6gcx, CVE-2020-26276
References: Repository: https://github.com/fleetdm/fleet
Blast Radius: 0.0

Affected Packages

go:github.com/fleetdm/fleet/v4
Dependent packages: 0
Dependent repositories: 6
Downloads:
Affected Version Ranges: < 3.5.1
Fixed in: 3.5.1
All affected versions:
All unaffected versions: 4.0.0, 4.0.1, 4.1.0, 4.28.0, 4.36.0, 4.37.0, 4.46.0