Lucene search

K
githubGitHub Advisory DatabaseGHSA-4M6J-23P2-8C54
HistoryFeb 26, 2024 - 8:04 p.m.

Armeria SAML authentication bypass due to missing validation on unsigned SAML messages

2024-02-2620:04:37
CWE-304
GitHub Advisory Database
github.com
7
armeria
saml
authentication
bypass
validation
patch
forge
vulnerability

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

AI Score

6.8

Confidence

High

EPSS

0

Percentile

9.0%

Impact

The SAML implementation provided by armeria-saml currently accepts unsigned SAML messages (assertions, logout requests, etc.) as they are, rather than rejecting them by default. As a result, an attacker can forge a SAML message to authenticate themselves, despite the fact that such an unsigned SAML message should be rejected.

Patches

The vulnerability has been patched in Armeria version 1.27.2. All users who rely on armeria-saml older than version 1.27.2 must upgrade to 1.27.2 or later.

Workarounds

There is no known workaround for this vulnerability.

References

SamlMessageUtil.validateSignature()

Affected configurations

Vulners
Node
com.linecorp.armeriaarmeria-samlRange1.27.1
VendorProductVersionCPE
com.linecorp.armeriaarmeria-saml*cpe:2.3:a:com.linecorp.armeria:armeria-saml:*:*:*:*:*:*:*:*

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

AI Score

6.8

Confidence

High

EPSS

0

Percentile

9.0%