Insecure Token Validation Affecting sustainsys.saml2 Open this link in a new tab package, versions [,1.0.2) [2.0.0,2.7.0)


0.0
medium
  • Attack Complexity

    High

  • User Interaction

    Required

  • Scope

    Changed

  • Confidentiality

    High

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • snyk-id

    SNYK-DOTNET-SUSTAINSYSSAML2-567167

  • published

    23 Apr 2020

  • disclosed

    21 Apr 2020

  • credit

    Unknown

How to fix?

Upgrade Sustainsys.Saml2 to version 1.0.2, 2.7.0 or higher.

Overview

Sustainsys.Saml2 is a SAML2 protocol support.

Affected versions of this package are vulnerable to Insecure Token Validation. It incorrectly treats all incoming tokens as bearer tokens, even though they have another subject confirmation method specified. This could be used by an attacker that could get access to Saml2 tokens with another subject confirmation method than bearer. The attacker could then use such a token to create a log in session.