CVE-2022-39299 – Signature bypass via multiple root elements in Passport-SAML
https://notcve.org/view.php?id=CVE-2022-39299
Passport-SAML is a SAML 2.0 authentication provider for Passport, the Node.js authentication library. A remote attacker may be able to bypass SAML authentication on a website using passport-saml. A successful attack requires that the attacker is in possession of an arbitrary IDP signed XML element. Depending on the IDP used, fully unauthenticated attacks (e.g without access to a valid user) might also be feasible if generation of a signed message can be triggered. Users should upgrade to passport-saml version 3.2.2 or newer. • http://packetstormsecurity.com/files/169826/Node-saml-Root-Element-Signature-Bypass.html https://github.com/node-saml/passport-saml/commit/8b7e3f5a91c8e5ac7e890a0c90bc7491ce33155e https://github.com/node-saml/passport-saml/security/advisories/GHSA-m974-647v-whv7 • CWE-347: Improper Verification of Cryptographic Signature •
CVE-2021-39171 – Unlimited transforms allowed for signed nodes
https://notcve.org/view.php?id=CVE-2021-39171
Passport-SAML is a SAML 2.0 authentication provider for Passport, the Node.js authentication library. Prior to version 3.1.0, a malicious SAML payload can require transforms that consume significant system resources to process, thereby resulting in reduced or denied service. This would be an effective way to perform a denial-of-service attack. This has been resolved in version 3.1.0. The resolution is to limit the number of allowable transforms to 2. • https://github.com/node-saml/passport-saml/pull/595 https://github.com/node-saml/passport-saml/security/advisories/GHSA-5379-r78w-42h2 • CWE-400: Uncontrolled Resource Consumption •