Lucene search

K
prionPRIOn knowledge basePRION:CVE-2022-23505
HistoryDec 13, 2022 - 8:15 a.m.

Authentication flaw

2022-12-1308:15:00
PRIOn knowledge base
www.prio-n.com
8
passport-wsfed-saml2
authentication flaw
bypass
wsfed
saml2 tokens
remote attacker
patched
version 4.6.3
workaround

7.7 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

54.4%

Passport-wsfed-saml2 is a ws-federation protocol and SAML2 tokens authentication provider for Passport. In versions prior to 4.6.3, a remote attacker may be able to bypass WSFed authentication on a website using passport-wsfed-saml2. A successful attack requires that the attacker is in possession of an arbitrary IDP signed assertion. Depending on the IDP used, fully unauthenticated attacks (e.g without access to a valid user) might also be feasible if generation of a signed message can be triggered. This issue is patched in version 4.6.3. Use of SAML2 authentication instead of WSFed is a workaround.

CPENameOperatorVersion
passport-wsfed-saml2le4.6.2

7.7 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

54.4%

Related for PRION:CVE-2022-23505