Skip to content

Commit 3beb1a9

Browse files
1 parent 302422c commit 3beb1a9

File tree

2 files changed

+128
-0
lines changed

2 files changed

+128
-0
lines changed
Lines changed: 64 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,64 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-8gqj-226h-gm8r",
4+
"modified": "2025-05-06T21:19:22Z",
5+
"published": "2025-05-06T21:18:49Z",
6+
"aliases": [
7+
"CVE-2025-46573"
8+
],
9+
"summary": "Passport-wsfed-saml2 allows SAML Authentication Bypass via Attribute Smuggling",
10+
"details": "### Overview\nThis vulnerability allows an attacker to impersonate any user during SAML authentication by tampering with a valid SAML response. This can be done by adding attributes to the response.\n\n### Am I Affected?\nYou are affected by this SAML Attribute Smuggling vulnerability if you are using `passport-wsfed-saml2` version 4.6.3 or below, specifically under the following conditions:\n1. The service provider is using `passport-wsfed-saml2`, \n2. A valid SAML Response signed by the Identity Provider can be obtained\n\n### Fix\nUpgrade to v4.6.4 or greater.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V4",
14+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "npm",
21+
"name": "passport-wsfed-saml2"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "3.0.5"
29+
},
30+
{
31+
"fixed": "4.6.4"
32+
}
33+
]
34+
}
35+
],
36+
"database_specific": {
37+
"last_known_affected_version_range": "<= 4.6.3"
38+
}
39+
}
40+
],
41+
"references": [
42+
{
43+
"type": "WEB",
44+
"url": "https://github.com/auth0/passport-wsfed-saml2/security/advisories/GHSA-8gqj-226h-gm8r"
45+
},
46+
{
47+
"type": "WEB",
48+
"url": "https://github.com/auth0/passport-wsfed-saml2/commit/e5cf3cc2a53748207f7a81bfba9195c8efa94181"
49+
},
50+
{
51+
"type": "PACKAGE",
52+
"url": "https://github.com/auth0/passport-wsfed-saml2"
53+
}
54+
],
55+
"database_specific": {
56+
"cwe_ids": [
57+
"CWE-290"
58+
],
59+
"severity": "CRITICAL",
60+
"github_reviewed": true,
61+
"github_reviewed_at": "2025-05-06T21:18:49Z",
62+
"nvd_published_at": null
63+
}
64+
}
Lines changed: 64 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,64 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-wjmp-wphq-jvqf",
4+
"modified": "2025-05-06T21:19:04Z",
5+
"published": "2025-05-06T21:18:43Z",
6+
"aliases": [
7+
"CVE-2025-46572"
8+
],
9+
"summary": "Passport-wsfed-saml2 allows SAML Authentication Bypass via Signature Wrapping",
10+
"details": "### Overview\nThis vulnerability allows an attacker to impersonate any user during SAML authentication by crafting a SAMLResponse. This can be done by using a valid SAML object that was signed by the configured IdP.\n\n### Am I Affected?\nYou are affected by this SAML Signature Wrapping vulnerability if you are using `passport-wsfed-saml2` version 4.5.1 or below, specifically under the following conditions:\n1. The service provider is using `passport-wsfed-saml2`,\n2. A valid SAML document signed by the Identity Provider can be obtained.\n\n### Fix\nUpgrade to v4.6.4 or greater.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V4",
14+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "npm",
21+
"name": "passport-wsfed-saml2"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "3.0.5"
29+
},
30+
{
31+
"fixed": "4.6.4"
32+
}
33+
]
34+
}
35+
],
36+
"database_specific": {
37+
"last_known_affected_version_range": "<= 4.6.3"
38+
}
39+
}
40+
],
41+
"references": [
42+
{
43+
"type": "WEB",
44+
"url": "https://github.com/auth0/passport-wsfed-saml2/security/advisories/GHSA-wjmp-wphq-jvqf"
45+
},
46+
{
47+
"type": "WEB",
48+
"url": "https://github.com/auth0/passport-wsfed-saml2/commit/e5cf3cc2a53748207f7a81bfba9195c8efa94181"
49+
},
50+
{
51+
"type": "PACKAGE",
52+
"url": "https://github.com/auth0/passport-wsfed-saml2"
53+
}
54+
],
55+
"database_specific": {
56+
"cwe_ids": [
57+
"CWE-347"
58+
],
59+
"severity": "CRITICAL",
60+
"github_reviewed": true,
61+
"github_reviewed_at": "2025-05-06T21:18:43Z",
62+
"nvd_published_at": null
63+
}
64+
}

0 commit comments

Comments
 (0)