samlify@2.1.0 vulnerabilities

High-level API for Single Sign On (SAML 2.0)

  • latest version

    2.8.11

  • latest non vulnerable version

  • first published

    7 years ago

  • latest version published

    9 months ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the samlify package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Improper Verification of Signature

    samlify is a Highly configuarable Node.js SAML 2.0 library for Single Sign On.

    Affected versions of this package are vulnerable to Improper Verification of Signature. An attacker could potentially wrap the signature of a SAML response, and insert a new username in the original token, making it appear as though a different user was authenticated.

    How to fix Improper Verification of Signature?

    Upgrade samlify to version 2.4.0 or higher.

    <2.4.0
    • H
    XML External Entity (XXE) Injection

    samlify is a Node.js API for Single Sign On (SAML 2.0).

    Affected versions of this package are vulnerable to XML Injection attack.

    An XML Signature Wrapping vulnerability exists in Samlify 2.2.0 and earlier, and in predecessor Express-saml2 which could allow attackers to impersonate arbitrary users.

    How to fix XML External Entity (XXE) Injection?

    Upgrade to shiba version 2.3.0 or higher.

    <2.3.0