Miggo Logo

CVE-2025-24894: The AspNetCore Remote Authenticator for SPID Allows SAML Response Signature Verification Bypass

9.1

CVSS Score
3.1

Basic Information

EPSS Score
0.41033%
Published
2/18/2025
Updated
2/18/2025
KEV Status
No
Technology
TechnologyC#

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
SPID.AspNetCore.Authenticationnuget<= 3.3.03.4.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from how the VerifySignature function processes XML signatures. The original implementation retrieves the first signature element (nodeList[0]) and only validates that single signature, regardless of its position or context. This allows an attacker to prepend a valid but irrelevant signature (e.g., from IdP metadata) and have malicious assertions accepted. The commit diff shows the patched version introduces iteration over all signature nodes and uses proper XMLDSIG namespace handling, confirming the original single-signature check was inadequate.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### **s*ription *ut**nti**tion usin* Spi* *n* *I* is **s** on t** S*ML* st*n**r* w*i** provi**s *or two *ntiti*s: I**ntity Provi**r (I*P): t** syst*m t**t *ut**nti**t*s us*rs *n* provi**s i**ntity in*orm*tion ( S*ML *ss*rtions ) to t** S*rvi** Prov

Reasoning

T** vuln*r**ility st*ms *rom *ow t** V*ri*ySi*n*tur* *un*tion pro**ss*s XML si*n*tur*s. T** ori*in*l impl*m*nt*tion r*tri*v*s t** *irst si*n*tur* *l*m*nt (no**List[*]) *n* only v*li**t*s t**t sin*l* si*n*tur*, r***r*l*ss o* its position or *ont*xt. T