Miggo Logo

GHSA-7fpw-cfc4-3p2c: Duplicate advisory: High severity vulnerability that affects passport-wsfed-saml2

8.1

CVSS Score
3.0

Basic Information

CVE ID
-
EPSS Score
-
Published
12/28/2017
Updated
6/21/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
passport-wsfed-saml2npm< 3.0.53.0.5

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper SAML response validation where only assertion signatures were checked. The Auth0 bulletin explicitly mentions XPath expression improvements and response/assertion wrapping attack prevention. These would require modifications to the core SAML processing functions - validateSignature for signature scope validation and parseResponse for proper element extraction. The functions are named based on standard SAML processing patterns in Passport.js strategies and Auth0's remediation description.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

## *upli**t* **visory T*is **visory **s ***n wit**r*wn ****us* it is * *upli**t* o* **S*-***w-r**v-v*p*. T*is link is m*int*in** to pr*s*rv* *xt*rn*l r***r*n**s. ## Ori*in*l **s*ription * vuln*r**ility **s ***n *is*ov*r** in t** *ut** p*ssport-ws***

Reasoning

T** vuln*r**ility st*ms *rom improp*r S*ML r*spons* v*li**tion w**r* only *ss*rtion si*n*tur*s w*r* ****k**. T** *ut** *ull*tin *xpli*itly m*ntions XP*t* *xpr*ssion improv*m*nts *n* r*spons*/*ss*rtion wr*ppin* *tt**k pr*v*ntion. T**s* woul* r*quir* m