CVE-2022-39299 – Signature bypass via multiple root elements in Passport-SAML
https://notcve.org/view.php?id=CVE-2022-39299
Passport-SAML is a SAML 2.0 authentication provider for Passport, the Node.js authentication library. A remote attacker may be able to bypass SAML authentication on a website using passport-saml. A successful attack requires that the attacker is in possession of an arbitrary IDP signed XML element. Depending on the IDP used, fully unauthenticated attacks (e.g without access to a valid user) might also be feasible if generation of a signed message can be triggered. Users should upgrade to passport-saml version 3.2.2 or newer. • http://packetstormsecurity.com/files/169826/Node-saml-Root-Element-Signature-Bypass.html https://github.com/node-saml/passport-saml/commit/8b7e3f5a91c8e5ac7e890a0c90bc7491ce33155e https://github.com/node-saml/passport-saml/security/advisories/GHSA-m974-647v-whv7 • CWE-347: Improper Verification of Cryptographic Signature •
CVE-2022-25896 – Session Fixation
https://notcve.org/view.php?id=CVE-2022-25896
This affects the package passport before 0.6.0. When a user logs in or logs out, the session is regenerated instead of being closed. Esto afecta a el paquete passport versiones anteriores a 0.6.0. Cuando un usuario es conectado o desconectado, la sesión es regenerada en lugar de cerrarse A misleading session regeneration flaw was found in passport. When a user logs in or logs out, the session is regenerated instead of being closed. • https://github.com/jaredhanson/passport/commit/7e9b9cf4d7be02428e963fc729496a45baeea608 https://github.com/jaredhanson/passport/pull/900 https://snyk.io/vuln/SNYK-JS-PASSPORT-2840631 https://access.redhat.com/security/cve/CVE-2022-25896 https://bugzilla.redhat.com/show_bug.cgi?id=2111862 • CWE-384: Session Fixation •
CVE-2021-39171 – Unlimited transforms allowed for signed nodes
https://notcve.org/view.php?id=CVE-2021-39171
Passport-SAML is a SAML 2.0 authentication provider for Passport, the Node.js authentication library. Prior to version 3.1.0, a malicious SAML payload can require transforms that consume significant system resources to process, thereby resulting in reduced or denied service. This would be an effective way to perform a denial-of-service attack. This has been resolved in version 3.1.0. The resolution is to limit the number of allowable transforms to 2. • https://github.com/node-saml/passport-saml/pull/595 https://github.com/node-saml/passport-saml/security/advisories/GHSA-5379-r78w-42h2 • CWE-400: Uncontrolled Resource Consumption •