passport-wsfed-saml2@4.6.3 vulnerabilities

SAML2 Protocol and WS-Fed library

  • latest version

    4.6.4

  • latest non vulnerable version

  • first published

    12 years ago

  • latest version published

    1 months ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the passport-wsfed-saml2 package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • C
    Improper Authentication

    passport-wsfed-saml2 is a SAML2 Protocol and WS-Fed library.

    Affected versions of this package are vulnerable to Improper Authentication via the SAMLResponse handling process. An attacker can impersonate any user during the authentication process by crafting a SAMLResponse using a valid SAML object that was signed by the configured IdP.

    Note:

    This is only exploitable if the following conditions are met:

    1. Your service provider uses passport-wsfed-saml2.

    2. A valid SAML Response, signed by the Identity Provider, can be obtained.

    How to fix Improper Authentication?

    Upgrade passport-wsfed-saml2 to version 4.6.4 or higher.

    >=3.0.5 <4.6.4
    • H
    User Impersonation

    passport-wsfed-saml2 is a SAML2 Protocol and WS-Fed library.

    Affected versions of this package are vulnerable to User Impersonation via attribute smuggling in the SAML response. An attacker can impersonate any user during SAML authentication by tampering with a valid SAML response and adding attributes to it.

    Note:

    This is only exploitable if the following conditions are met:

    1. Your service provider uses passport-wsfed-saml2;

    2. A valid SAML Response, signed by the Identity Provider, can be obtained.

    How to fix User Impersonation?

    Upgrade passport-wsfed-saml2 to version 4.6.4 or higher.

    >=3.0.5 <4.6.4