CVE-2022-23505 – passport-wsfed-saml2
Package
Manager: npm
Name: passport-wsfed-saml2
Vulnerable Version: >=0 <4.6.3
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.0006 pctl0.18825
Details
Authentication Bypass for passport-wsfed-saml2 # Overview A remote attacker can bypass WSFed authentication on a website using passport-wsfed-saml2. A successful attack requires that the attacker is in possession of an arbitrary IDP signed WSFed assertion. Depending on the IDP used, fully unauthenticated attacks (e.g without access to a valid user) might also be feasible if generation of a signed message can be triggered. # Am I affected? You are affected if you are using WSFed protocol with the passport-wsfed-saml2 library versions < 4.6.3. SAML2 protocol is not affected. # How do I fix it? Upgrade the library to version 4.6.3. # Will the fix impact my users? No, the fix will not impact your users.
Metadata
Created: 2022-12-13T17:16:36Z
Modified: 2022-12-15T21:59:51Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/12/GHSA-ppjq-qxhx-m25f/GHSA-ppjq-qxhx-m25f.json
CWE IDs: ["CWE-287"]
Alternative ID: GHSA-ppjq-qxhx-m25f
Finding: F039
Auto approve: 1