Vulnerability Description
node SAML is a SAML 2.0 library based on the SAML implementation of passport-saml. A remote attacker may be able to bypass SAML authentication on a website using passport-saml. A successful attack requires that the attacker is in possession of an arbitrary IDP signed XML element. Depending on the IDP used, fully unauthenticated attacks (e.g without access to a valid user) might also be feasible if generation of a signed message can be triggered. Users should upgrade to node-saml version 4.0.0-beta5 or newer. Disabling SAML authentication may be done as a workaround.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Node Saml Project | Node Saml | < 4.0.0 |
Related Weaknesses (CWE)
References
- https://github.com/node-saml/node-saml/commit/c1f275c289c01921e58f5c70ce0fdbc528PatchThird Party Advisory
- https://github.com/node-saml/node-saml/security/advisories/GHSA-5p8w-2mvw-38pvThird Party Advisory
- https://github.com/node-saml/node-saml/commit/c1f275c289c01921e58f5c70ce0fdbc528PatchThird Party Advisory
- https://github.com/node-saml/node-saml/security/advisories/GHSA-5p8w-2mvw-38pvThird Party Advisory
FAQ
What is CVE-2022-39300?
CVE-2022-39300 is a vulnerability with a CVSS score of 7.7 (HIGH). node SAML is a SAML 2.0 library based on the SAML implementation of passport-saml. A remote attacker may be able to bypass SAML authentication on a website using passport-saml. A successful attack req...
How severe is CVE-2022-39300?
CVE-2022-39300 has been rated HIGH with a CVSS base score of 7.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-39300?
Check the references section above for vendor advisories and patch information. Affected products include: Node Saml Project Node Saml.