Samlify vulnerable to Authentication Bypass by allowing tokens to be reused with different usernames
High severity
GitHub Reviewed
Published
Jan 4, 2018
to the GitHub Advisory Database
•
Updated Aug 18, 2023
Description
Published to the GitHub Advisory Database
Jan 4, 2018
Reviewed
Jun 16, 2020
Last updated
Aug 18, 2023
Versions of
samlify
prior to 2.4.0-rc5 are vulnerable to Authentication Bypass. The package fails to prevent XML Signature Wrapping, allowing tokens to be reused with different usernames. A remote attacker can modify SAML content for a SAML service provider without invalidating the cryptographic signature, which may allow attackers to bypass primary authentication for the affected SAML service provider.Recommendation
Upgrade to version 2.4.0-rc5 or later
References