| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/rancher/rancher | go | <= 2.1.4 |
The vulnerability stems from how errorMsg was handled in the SAML assertion flow. The original code in HandleSamlAssertion used a hardcoded errorMsg message appended to the redirect URL (e.g., 'errorMsg=Invalid saml attributes'). While this specific instance used a static string, the broader login component allowed the errorMsg query parameter to be directly manipulated in the /login endpoint. Attackers could craft URLs with malicious errorMsg values, which were rendered on the login page with insufficient sanitization (filtering tags but allowing special characters/URLs). The commit fixed this by replacing the message with a translation key, decoupling user input from the displayed content. The HandleSamlAssertion function is the root cause because it initiated the redirect with the vulnerable errorMsg parameter construction.