Information Exposure Affecting github.com/fleetdm/fleet/v4/server/service package, versions <4.9.1


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Not Defined
EPSS
0.06% (30th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Information Exposure vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-GOLANG-GITHUBCOMFLEETDMFLEETV4SERVERSERVICE-2395411
  • published6 Feb 2022
  • disclosed6 Feb 2022
  • creditIan Carroll

Introduced: 6 Feb 2022

CVE-2022-23600  (opens in a new tab)
CWE-287  (opens in a new tab)

How to fix?

Upgrade github.com/fleetdm/fleet/v4/server/service to version 4.9.1 or higher.

Overview

Affected versions of this package are vulnerable to Information Exposure by allowing to spoof SAML authentication with missing audience verification. This impacts deployments using SAML SSO in two specific cases:

  1. A malicious or compromised Service Provider (SP) could reuse the SAML response to log into Fleet as a user -- only if the user has an account with the same email in Fleet, and the user signs into the malicious SP via SAML SSO from the same Identity Provider (IdP) configured.
  2. A user could reuse a SAML response intended for another SP to log into Fleet. This is only a concern if the user is blocked from Fleet in the IdP, but continues to have an account in Fleet. If the user is blocked from the IdP entirely, this cannot be exploited.

Note: This vulnerability is fixed in version 4.9.1 on Github

References

CVSS Scores

version 3.1