User Impersonation Affecting passport-wsfed-saml2 package, versions <3.0.5


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.25% (65th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about User Impersonation vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDnpm:passport-wsfed-saml2:20171222
  • published3 Jan 2018
  • disclosed22 Dec 2017
  • creditAlan Bishop

Introduced: 22 Dec 2017

CVE-2017-16897  (opens in a new tab)
CWE-269  (opens in a new tab)

How to fix?

Upgrade passport-wsfed-saml2 to version 3.0.5 or higher.

Overview

passport-wsfed-saml2 is a ws-federation protocol + SAML2 tokens authentication provider for Passport.

Affected versons if thus package are vulnerable to User Impersonation. A vulnerability has been discovered in the Auth0 passport-wsfed-saml2 library affecting versions < 3.0.5. This vulnerability allows an attacker to impersonate another user and potentially elevate their privileges if the SAML identity provider does not sign the full SAML response (e.g., only signs the assertion within the response).

CVSS Scores

version 3.1