2 results (0.010 seconds)

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

Node-SAML is a SAML library not dependent on any frameworks that runs in Node. The lack of checking of current timestamp allows a LogoutRequest XML to be reused multiple times even when the current time is past the NotOnOrAfter. This could impact the user where they would be logged out from an expired LogoutRequest. In bigger contexts, if LogoutRequests are sent out in mass to different SPs, this could impact many users on a large scale. This issue was patched in version 4.0.5. • https://github.com/node-saml/node-saml/commit/045e3b9c54211fdb95f96edf363679845b195cec https://github.com/node-saml/node-saml/releases/tag/v4.0.5 https://github.com/node-saml/node-saml/security/advisories/GHSA-vx8m-6fhw-pccw • CWE-347: Improper Verification of Cryptographic Signature CWE-613: Insufficient Session Expiration •

CVSS: 8.1EPSS: 0%CPEs: 6EXPL: 0

node SAML is a SAML 2.0 library based on the SAML implementation of passport-saml. A remote attacker may be able to bypass SAML authentication on a website using passport-saml. A successful attack requires that the attacker is in possession of an arbitrary IDP signed XML element. Depending on the IDP used, fully unauthenticated attacks (e.g without access to a valid user) might also be feasible if generation of a signed message can be triggered. Users should upgrade to node-saml version 4.0.0-beta5 or newer. • https://github.com/node-saml/node-saml/commit/c1f275c289c01921e58f5c70ce0fdbc5287e5fbe https://github.com/node-saml/node-saml/security/advisories/GHSA-5p8w-2mvw-38pv • CWE-347: Improper Verification of Cryptographic Signature •