Improper Authentication Affecting github.com/robotsandpencils/go-saml package, versions *


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Authentication vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-GOLANG-GITHUBCOMROBOTSANDPENCILSGOSAML-7640983
  • published6 Aug 2024
  • disclosed5 Aug 2024
  • creditPeter Stöckli

Introduced: 5 Aug 2024

CVE-2023-48703  (opens in a new tab)
CWE-287  (opens in a new tab)

How to fix?

There is no fixed version for github.com/RobotsAndPencils/go-saml.

Overview

github.com/RobotsAndPencils/go-saml is a SAML client library written in Go.

Affected versions of this package are vulnerable to Improper Authentication due to the improper handling of the xmlsec1 command line tool during the signature verification process. An attacker can manipulate the SAML assertions by providing a self-signed public key embedded directly in the SAML token, effectively bypassing authentication controls.

Note:

This is only exploitable if the system relies on the default configuration of the xmlsec1 tool without specifying enabled key data.

Workaround

This vulnerability can be mitigated by forking the go-saml project and adding the command line argument --enabled-key-data with a value such as x509 or raw-x509-cert when using the xmlsec1 binary in the verify function.

References

CVSS Scores

version 4.0
version 3.1