
CVE-2023-45683 – Cross site scripting via missing binding syntax validation In ACS location in github.com/crewjam/saml
https://notcve.org/view.php?id=CVE-2023-45683
16 Oct 2023 — github.com/crewjam/saml is a saml library for the go language. In affected versions the package does not validate the ACS Location URI according to the SAML binding being parsed. If abused, this flaw allows attackers to register malicious Service Providers at the IdP and inject Javascript in the ACS endpoint definition, achieving Cross-Site-Scripting (XSS) in the IdP context during the redirection at the end of a SAML SSO Flow. Consequently, an attacker may perform any authenticated action as the victim onc... • https://github.com/crewjam/saml/commit/b07b16cf83c4171d16da4d85608cb827f183cd79 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2023-28119 – crewjam/saml vulnerable to Denial Of Service Via Deflate Decompression Bomb
https://notcve.org/view.php?id=CVE-2023-28119
22 Mar 2023 — The crewjam/saml go library contains a partial implementation of the SAML standard in golang. Prior to version 0.4.13, the package's use of `flate.NewReader` does not limit the size of the input. The user can pass more than 1 MB of data in the HTTP request to the processing functions, which will be decompressed server-side using the Deflate algorithm. Therefore, after repeating the same request multiple times, it is possible to achieve a reliable crash since the operating system kills the process. This issu... • https://github.com/crewjam/saml/commit/8e9236867d176ad6338c870a84e2039aef8a5021 • CWE-770: Allocation of Resources Without Limits or Throttling •

CVE-2022-44457
https://notcve.org/view.php?id=CVE-2022-44457
08 Nov 2022 — A vulnerability has been identified in Mendix SAML (Mendix 7 compatible) (All versions < V1.17.0), Mendix SAML (Mendix 7 compatible) (All versions >= V1.17.0 < V1.17.2), Mendix SAML (Mendix 8 compatible) (All versions < V2.3.0), Mendix SAML (Mendix 8 compatible) (All versions >= V2.3.0 < V2.3.2), Mendix SAML (Mendix 9 compatible, New Track) (All versions < V3.3.1), Mendix SAML (Mendix 9 compatible, New Track) (All versions >= V3.3.1 < V3.3.5), Mendix SAML (Mendix 9 compatible, Upgrade Track) (All versions <... • https://cert-portal.siemens.com/productcert/pdf/ssa-638652.pdf • CWE-294: Authentication Bypass by Capture-replay •

CVE-2022-37011
https://notcve.org/view.php?id=CVE-2022-37011
13 Sep 2022 — A vulnerability has been identified in Mendix SAML (Mendix 7 compatible) (All versions < V1.17.0), Mendix SAML (Mendix 8 compatible) (All versions < V2.3.0), Mendix SAML (Mendix 9 compatible, New Track) (All versions < V3.3.1), Mendix SAML (Mendix 9 compatible, Upgrade Track) (All versions < V3.3.0). Affected versions of the module insufficiently protect from packet capture replay. This could allow unauthorized remote attackers to bypass authentication and get access to the application. For compatibility re... • https://cert-portal.siemens.com/productcert/pdf/ssa-638652.pdf • CWE-294: Authentication Bypass by Capture-replay •

CVE-2022-32286
https://notcve.org/view.php?id=CVE-2022-32286
14 Jun 2022 — A vulnerability has been identified in Mendix SAML Module (Mendix 7 compatible) (All versions < V1.16.6), Mendix SAML Module (Mendix 8 compatible) (All versions < V2.2.2), Mendix SAML Module (Mendix 9 compatible) (All versions < V3.2.3). In certain configurations SAML module is vulnerable to Cross Site Scripting (XSS) attacks due to insufficient error message sanitation. This could allow an attacker to execute malicious code by tricking users into accessing a malicious link. Se ha identificado una vulnerabi... • https://cert-portal.siemens.com/productcert/pdf/ssa-740594.pdf • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2022-32285
https://notcve.org/view.php?id=CVE-2022-32285
14 Jun 2022 — A vulnerability has been identified in Mendix SAML Module (Mendix 7 compatible) (All versions < V1.16.6), Mendix SAML Module (Mendix 8 compatible) (All versions < V2.2.2), Mendix SAML Module (Mendix 9 compatible) (All versions < V3.2.3). The affected module is vulnerable to XML External Entity (XXE) attacks due to insufficient input sanitation. This may allow an attacker to disclose confidential data under certain circumstances. Se ha identificado una vulnerabilidad en el módulo SAML de Mendix (compatible c... • https://cert-portal.siemens.com/productcert/pdf/ssa-740594.pdf • CWE-611: Improper Restriction of XML External Entity Reference •

CVE-2021-36786
https://notcve.org/view.php?id=CVE-2021-36786
13 Aug 2021 — The miniorange_saml (aka Miniorange Saml) extension before 1.4.3 for TYPO3 allows Sensitive Data Exposure of API credentials and private keys. La extensión miniorange_saml (también se conoce como Miniorange Saml) versiones anteriores a 1.4.3 para TYPO3, permite una exposición de datos confidenciales de credenciales y claves privadas de la API. • https://typo3.org/help/security-advisories/security • CWE-922: Insecure Storage of Sensitive Information •

CVE-2021-36785
https://notcve.org/view.php?id=CVE-2021-36785
13 Aug 2021 — The miniorange_saml (aka Miniorange Saml) extension before 1.4.3 for TYPO3 allows XSS. La extensión miniorange_saml (también se conoce como Miniorange Saml) versiones anteriores a 1.4.3 para TYPO3, permite un ataque de tipo XSS. • https://typo3.org/help/security-advisories/security • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2021-33712
https://notcve.org/view.php?id=CVE-2021-33712
08 Jun 2021 — A vulnerability has been identified in Mendix SAML Module (All versions < V2.1.2). The configuration of the SAML module does not properly check various restrictions and validations imposed by an identity provider. This could allow a remote authenticated attacker to escalate privileges. Se ha identificado una vulnerabilidad en el módulo SAML de Mendix (todas las versiones anteriores a V2.1.2). La configuración del módulo SAML no comprueba apropiadamente varias restricciones y validaciones impuestas por un pr... • https://cert-portal.siemens.com/productcert/pdf/ssa-522654.pdf • CWE-345: Insufficient Verification of Data Authenticity •

CVE-2018-1000602
https://notcve.org/view.php?id=CVE-2018-1000602
26 Jun 2018 — A session fixation vulnerability exists in Jenkins SAML Plugin 1.0.6 and earlier in SamlSecurityRealm.java that allows unauthorized attackers to impersonate another users if they can control the pre-authentication session. Existe una vulnerabilidad de fijación de sesión en el plugin Google Login en versiones 1.0.6 y anteriores para Jenkins en SamlSecurityRealm.java que permite que los atacantes no autorizados suplanten otro usuario si pueden controlar la sesión de preautenticación. • https://jenkins.io/security/advisory/2018-06-25/#SECURITY-916 • CWE-384: Session Fixation •