GHSA-7fpw-cfc4-3p2c: Duplicate advisory: High severity vulnerability that affects passport-wsfed-saml2
8.1
CVSS Score
3.0
Basic Information
CVE ID
-
GHSA ID
EPSS Score
-
CWE
Published
12/28/2017
Updated
6/21/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
passport-wsfed-saml2 | npm | < 3.0.5 | 3.0.5 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper SAML response validation where only assertion signatures were checked. The Auth0 bulletin explicitly mentions XPath expression improvements and response/assertion wrapping attack prevention. These would require modifications to the core SAML processing functions - validateSignature
for signature scope validation and parseResponse
for proper element extraction. The functions are named based on standard SAML processing patterns in Passport.js
strategies and Auth0's remediation description.