Insecure Token Validation Affecting sustainsys.saml2 package, versions [,1.0.2)[2.0.0,2.7.0)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.23% (61st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DOTNET-SUSTAINSYSSAML2-567167
  • published23 Apr 2020
  • disclosed21 Apr 2020
  • creditUnknown

Introduced: 21 Apr 2020

CVE-2020-5268  (opens in a new tab)
CWE-303  (opens in a new tab)

How to fix?

Upgrade Sustainsys.Saml2 to version 1.0.2, 2.7.0 or higher.

Overview

Sustainsys.Saml2 is a SAML2 protocol support.

Affected versions of this package are vulnerable to Insecure Token Validation. It incorrectly treats all incoming tokens as bearer tokens, even though they have another subject confirmation method specified. This could be used by an attacker that could get access to Saml2 tokens with another subject confirmation method than bearer. The attacker could then use such a token to create a log in session.

CVSS Scores

version 3.1