blob: 2580b5b874235cdec70fbdfc3d68d8a5616efe8b [file] [log] [blame]
id: GO-2022-1129
modules:
- module: github.com/crewjam/saml
versions:
- fixed: 0.4.9
vulnerable_at: 0.4.8
packages:
- package: github.com/crewjam/saml
symbols:
- ServiceProvider.validateSignature
- findChild
derived_symbols:
- ServiceProvider.ParseResponse
- ServiceProvider.ParseXMLArtifactResponse
- ServiceProvider.ParseXMLResponse
- ServiceProvider.ValidateLogoutResponseForm
- ServiceProvider.ValidateLogoutResponseRedirect
- ServiceProvider.ValidateLogoutResponseRequest
summary: Authentication bypass in github.com/crewjam/saml
description: |-
Authentication bypass is possible when processing SAML responses containing
multiple Assertion elements.
cves:
- CVE-2022-41912
ghsas:
- GHSA-j2jp-wvqg-wc2g
credits:
- Felix Wilhelm from Google Project Zero
references:
- advisory: https://github.com/prometheus/exporter-toolkit/security/advisories/GHSA-7rg2-cxvp-9p7p
- fix: https://github.com/crewjam/saml/commit/aee3fb1edeeaf1088fcb458727e0fd863d277f8b