Lucene search

K
osvGoogleOSV:GHSA-8JJF-W7J6-323C
HistoryJan 04, 2018 - 9:03 p.m.

Samlify vulnerable to Authentication Bypass by allowing tokens to be reused with different usernames

2018-01-0421:03:33
Google
osv.dev
10

EPSS

0.001

Percentile

44.4%

Versions of samlify prior to 2.4.0-rc5 are vulnerable to Authentication Bypass. The package fails to prevent XML Signature Wrapping, allowing tokens to be reused with different usernames. A remote attacker can modify SAML content for a SAML service provider without invalidating the cryptographic signature, which may allow attackers to bypass primary authentication for the affected SAML service provider.

Recommendation

Upgrade to version 2.4.0-rc5 or later

EPSS

0.001

Percentile

44.4%

Related for OSV:GHSA-8JJF-W7J6-323C