-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| Sustainsys.Saml2 | nuget | < 1.0.3 | 1.0.3 |
| Sustainsys.Saml2 | nuget | >= 2.0.0, < 2.9.2 | 2.9.2 |
| Kentor.AuthServices | nuget | <= 0.23.0 |
The vulnerability stems from two key issues: 1) Insufficient validation of the SAML assertion issuer against the expected Identity Provider, and 2) Improper binding of stored request state to specific authentication contexts. The AcsCommand.ProcessResponse method would be responsible for validating assertion issuers during response processing, which was inadequate prior to patches. The StoredRequestState.GetRequestState method likely retrieved state without considering the IdP context, allowing state substitution. These conclusions align with the described attack vectors (CWE-289/CWE-294) and the referenced GitHub issues #712 (assertion validation) and #713 (state binding).