Vulnerability Details : CVE-2022-41912
The crewjam/saml go library prior to version 0.4.9 is vulnerable to an authentication bypass when processing SAML responses containing multiple Assertion elements. This issue has been corrected in version 0.4.9. There are no workarounds other than upgrading to a fixed version.
Vulnerability category: BypassGain privilege
Products affected by CVE-2022-41912
- cpe:2.3:a:saml_project:saml:*:*:*:*:*:go:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-41912
0.27%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 51 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-41912
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST | |
9.1
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N |
3.9
|
5.2
|
GitHub, Inc. |
CWE ids for CVE-2022-41912
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by: security-advisories@github.com (Primary)
References for CVE-2022-41912
-
https://github.com/crewjam/saml/commit/aee3fb1edeeaf1088fcb458727e0fd863d277f8b
Merge pull request from GHSA-j2jp-wvqg-wc2g · crewjam/saml@aee3fb1 · GitHubPatch;Third Party Advisory
-
https://github.com/crewjam/saml/security/advisories/GHSA-j2jp-wvqg-wc2g
Signature bypass via multiple Assertion elements · Advisory · crewjam/saml · GitHubThird Party Advisory
-
http://packetstormsecurity.com/files/170356/crewjam-saml-Signature-Bypass.html
crewjam/saml Signature Bypass ≈ Packet StormThird Party Advisory;VDB Entry
Jump to