CVE-2023-45683: Cross-site Scripting via missing Binding syntax validation
7.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.54668%
CWE
Published
10/17/2023
Updated
11/11/2023
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
github.com/crewjam/saml | go | < 0.4.14 | 0.4.14 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from missing URI scheme validation during XML unmarshaling of SAML endpoints. The commit adds checkEndpointLocation
validation and implements it in UnmarshalXML
methods for both Endpoint
and IndexedEndpoint
types. The pre-patch versions lacked these validations, making these deserialization functions the entry points for untrusted Location values. The test case added in metadata_test.go
specifically verifies rejection of javascript:
URIs for HTTP-POST
binding, confirming these were the vulnerable parsing points.