The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Improper Authentication vulnerabilities in an interactive lesson.
Start learningThere is no fixed version for github.com/RobotsAndPencils/go-saml
.
github.com/RobotsAndPencils/go-saml is a SAML client library written in Go.
Affected versions of this package are vulnerable to Improper Authentication due to the improper handling of the xmlsec1
command line tool during the signature verification process. An attacker can manipulate the SAML assertions by providing a self-signed public key embedded directly in the SAML token, effectively bypassing authentication controls.
Note:
This is only exploitable if the system relies on the default configuration of the xmlsec1
tool without specifying enabled key data.
This vulnerability can be mitigated by forking the go-saml project and adding the command line argument --enabled-key-data
with a value such as x509
or raw-x509-cert
when using the xmlsec1
binary in the verify function.