Wizkunde SAMLBase may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-2997 Wizkunde SAMLBase may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.
Github GHSA Github GHSA GHSA-7gh2-8q93-87hp Wizkunde SAMLBase SAML Bypass
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published:

Updated: 2024-09-16T22:55:40.613Z

Reserved: 2018-01-12T00:00:00

Link: CVE-2018-5387

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-07-24T15:29:01.187

Modified: 2024-11-21T04:08:43.203

Link: CVE-2018-5387

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.