// For flags

CVE-2020-26276

SAML authentication vulnerability in Fleet

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Fleet is an open source osquery manager. In Fleet before version 3.5.1, due to issues in Go's standard library XML parsing, a valid SAML response may be mutated by an attacker to modify the trusted document. This can result in allowing unverified logins from a SAML IdP. Users that configure Fleet with SSO login may be vulnerable to this issue. This issue is patched in 3.5.1. The fix was made using https://github.com/mattermost/xml-roundtrip-validator If upgrade to 3.5.1 is not possible, users should disable SSO authentication in Fleet.

Fleet es un administrador de osquery de código abierto. En Fleet versiones anteriores a 3.5.1, debido a problemas en el análisis de XML de la biblioteca estándar de Go, una respuesta válida SAML puede ser mutada por un atacante para modificar el documento confiable. Esto puede resultar en permitir inicios de sesión no verificados desde un IdP SAML. Los usuarios que configuran Fleet con inicio de sesión SSO pueden ser vulnerables a este problema. Este problema está parcheado en la versión 3.5.1. La corrección fue realizada usando https://github.com/mattermost/xml-roundtrip-validator si la actualización a la versión 3.5.1 no es posible, los usuarios deben deshabilitar la autenticación SSO en Fleet

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-10-01 CVE Reserved
  • 2020-12-17 CVE Published
  • 2024-08-04 CVE Updated
  • 2024-12-17 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-290: Authentication Bypass by Spoofing
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Fleetdm
Search vendor "Fleetdm"
Fleet
Search vendor "Fleetdm" for product "Fleet"
< 3.5.1
Search vendor "Fleetdm" for product "Fleet" and version " < 3.5.1"
-
Affected