CVE-2022-39299
October 12, 2022
Passport-SAML is a SAML 2.0 authentication provider for Passport, the Node.js authentication library. A remote attacker may be able to bypass SAML authentication on a website using passport-saml. A successful attack requires that the attacker is in possession of an arbitrary IDP signed XML element. Depending on the IDP used, fully unauthenticated attacks (e.g without access to a valid user) might also be feasible if generation of a signed message can be triggered. Users should upgrade to passport-saml version 3.2.2 or newer. The issue was also present in the beta releases of "node-saml" before version 4.0.0-beta.5. If you cannot upgrade, disabling SAML authentication may be done as a workaround.
Affected Packages
@node-saml/passport-saml (NPM):
Affected version(s) >=4.0.0-beta.1 <4.0.0-beta.3Fix Suggestion:
Update to version 4.0.0-beta.3passport-saml (NPM):
Affected version(s) >=0.0.1 <3.2.2Fix Suggestion:
Update to version 3.2.2@node-saml/node-saml (NPM):
Affected version(s) >=4.0.0-beta.3 <4.0.0-beta.5Fix Suggestion:
Update to version 4.0.0-beta.5@node-saml/passport-saml (NPM):
Affected version(s) >=4.0.0-beta.1 <4.0.0-beta.3Fix Suggestion:
Update to version 4.0.0-beta.3@node-saml/node-saml (NPM):
Affected version(s) >=4.0.0-beta.3 <4.0.0-beta.5Fix Suggestion:
Update to version 4.0.0-beta.5@node-saml/node-saml (NPM):
Affected version(s) >=4.0.0-beta.3 <4.0.0-beta.5Fix Suggestion:
Update to version 4.0.0-beta.5@node-saml/passport-saml (NPM):
Affected version(s) >=4.0.0-beta.1 <4.0.0-beta.3Fix Suggestion:
Update to version 4.0.0-beta.3passport-saml (NPM):
Affected version(s) >=0.0.1 <3.2.2Fix Suggestion:
Update to version 3.2.2passport-saml (NPM):
Affected version(s) >=0.0.1 <3.2.2Fix Suggestion:
Update to version 3.2.2@node-saml/passport-saml (NPM):
Affected version(s) >=4.0.0-beta.1 <4.0.0-beta.3Fix Suggestion:
Update to version 4.0.0-beta.3@node-saml/node-saml (NPM):
Affected version(s) >=4.0.0-beta.3 <4.0.0-beta.5Fix Suggestion:
Update to version 4.0.0-beta.5Related ResourcesĀ (7)
Do you need more information?
Contact UsCVSS v4
Base Score:
9.1
Attack Vector
NETWORK
Attack Complexity
HIGH
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
NONE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
HIGH
Vulnerable System Availability
NONE
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
7.4
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
NONE
Weakness Type (CWE)
Improper Verification of Cryptographic Signature
EPSS
Base Score:
4.19