A vulnerability has been discovered in the Auth0 passport-wsfed-saml2 library affecting versions < 3.0.5. This vulnerability allows an attacker to impersonate another user and potentially elevate their privileges if the SAML identity provider does not sign the full SAML response (e.g., only signs the assertion within the response).
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-1724 | A vulnerability has been discovered in the Auth0 passport-wsfed-saml2 library affecting versions < 3.0.5. This vulnerability allows an attacker to impersonate another user and potentially elevate their privileges if the SAML identity provider does not sign the full SAML response (e.g., only signs the assertion within the response). |
Github GHSA |
GHSA-77fw-rf4v-vfp9 | passport-wsfed-saml2 vulnerable to Signature Bypass in SAML2 token |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://auth0.com/docs/security/bulletins/cve-2017-16897 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T20:35:21.320Z
Reserved: 2017-11-20T00:00:00
Link: CVE-2017-16897
No data.
Status : Deferred
Published: 2017-12-27T17:08:17.483
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-16897
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA