NA

CVE-2022-39299

Published: 12/10/2022 Updated: 20/01/2023
CVSS v3 Base Score: 8.1 | Impact Score: 5.9 | Exploitability Score: 2.2
VMScore: 0

Vulnerability Summary

Passport-SAML is a SAML 2.0 authentication provider for Passport, the Node.js authentication library. A remote attacker may be able to bypass SAML authentication on a website using passport-saml. A successful attack requires that the attacker is in possession of an arbitrary IDP signed XML element. Depending on the IDP used, fully unauthenticated attacks (e.g without access to a valid user) might also be feasible if generation of a signed message can be triggered. Users should upgrade to passport-saml version 3.2.2 or newer. The issue was also present in the beta releases of `node-saml` before version 4.0.0-beta.5. If you cannot upgrade, disabling SAML authentication may be done as a workaround.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

passport-saml project passport-saml 4.0.0

passport-saml project passport-saml

Vendor Advisories

Debian Bug report logs - #1024736 node-xmldom: CVE-2022-39353 Package: src:node-xmldom; Maintainer for src:node-xmldom is Debian Javascript Maintainers <pkg-javascript-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Thu, 24 Nov 2022 05:54:02 UTC Severity: important Tags: se ...

Github Repositories

A Simple CVE-2022-39299 PoC exploit generator to bypass authentication in SAML SSO Integrations using vulnerable versions of passport-saml

Exploiting CVE-2022-39299 Signature bypass via multiple root elements Advisory : githubcom/node-saml/passport-saml/security/advisories/GHSA-m974-647v-whv7 Patch : githubcom/node-saml/passport-saml/commit/8b7e3f5a91c8e5ac7e890a0c90bc7491ce33155e Base Payload Example Extracted From node-saml Test-cases: githubcom/node-saml/node-saml/blob/c1f275c289c0192