Lucene search

K
nvd[email protected]NVD:CVE-2022-39300
HistoryOct 13, 2022 - 10:15 p.m.

CVE-2022-39300

2022-10-1322:15:10
CWE-347
web.nvd.nist.gov
1
node saml
bypass authentication
remote attacker
idp
passport-saml
upgrade
disabling authentication

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

0.003 Low

EPSS

Percentile

70.8%

node SAML is a SAML 2.0 library based on the SAML implementation of passport-saml. A remote attacker may be able to bypass SAML authentication on a website using passport-saml. A successful attack requires that the attacker is in possession of an arbitrary IDP signed XML element. Depending on the IDP used, fully unauthenticated attacks (e.g without access to a valid user) might also be feasible if generation of a signed message can be triggered. Users should upgrade to node-saml version 4.0.0-beta5 or newer. Disabling SAML authentication may be done as a workaround.

Affected configurations

NVD
Node
node_saml_projectnode_samlRange<4.0.0node.js
OR
node_saml_projectnode_samlMatch4.0.0beta0node.js
OR
node_saml_projectnode_samlMatch4.0.0beta1node.js
OR
node_saml_projectnode_samlMatch4.0.0beta2node.js
OR
node_saml_projectnode_samlMatch4.0.0beta3node.js
OR
node_saml_projectnode_samlMatch4.0.0beta4node.js

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

0.003 Low

EPSS

Percentile

70.8%

Related for NVD:CVE-2022-39300