Passport-SAML is a SAML 2.0 authentication provider for Passport, the Node.js authentication library. A remote attacker may be able to bypass SAML authentication on a website using passport-saml. A successful attack requires that the attacker is in possession of an arbitrary IDP signed XML element. Depending on the IDP used, fully unauthenticated attacks (e.g without access to a valid user) might also be feasible if generation of a signed message can be triggered. Users should upgrade to passport-saml version 3.2.2 or newer. The issue was also present in the beta releases of `node-saml` before version 4.0.0-beta.5. If you cannot upgrade, disabling SAML authentication may be done as a workaround.
CVE-2022-39299 - High Severity Vulnerability
Vulnerable Library - passport-saml-3.0.0.tgz
SAML 2.0 authentication strategy for Passport
Library home page: https://registry.npmjs.org/passport-saml/-/passport-saml-3.0.0.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/passport-saml/package.json
Dependency Hierarchy: - :x: **passport-saml-3.0.0.tgz** (Vulnerable Library)
Found in base branch: dev
Vulnerability Details
Passport-SAML is a SAML 2.0 authentication provider for Passport, the Node.js authentication library. A remote attacker may be able to bypass SAML authentication on a website using passport-saml. A successful attack requires that the attacker is in possession of an arbitrary IDP signed XML element. Depending on the IDP used, fully unauthenticated attacks (e.g without access to a valid user) might also be feasible if generation of a signed message can be triggered. Users should upgrade to passport-saml version 3.2.2 or newer. The issue was also present in the beta releases of `node-saml` before version 4.0.0-beta.5. If you cannot upgrade, disabling SAML authentication may be done as a workaround.
Publish Date: 2022-10-12
URL: CVE-2022-39299
CVSS 3 Score Details (7.4)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://github.com/node-saml/passport-saml/security/advisories/GHSA-m974-647v-whv7
Release Date: 2022-10-12
Fix Resolution: 3.2.2
Step up your Open Source Security Game with Mend here