Wizkunde SAMLBase SAML Bypass
High severity
GitHub Reviewed
Published
May 13, 2022
to the GitHub Advisory Database
•
Updated Oct 5, 2023
Description
Published by the National Vulnerability Database
Jul 24, 2018
Published to the GitHub Advisory Database
May 13, 2022
Reviewed
Jul 7, 2023
Last updated
Oct 5, 2023
Wizkunde SAMLBase may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.
References