Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-39299— Signature bypass via multiple root elements in Passport-SAML

CVSS 7.4 · High EPSS 4.65% · P89
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2022-39299

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Signature bypass via multiple root elements in Passport-SAML
Source: NVD (National Vulnerability Database)
Vulnerability Description
Passport-SAML is a SAML 2.0 authentication provider for Passport, the Node.js authentication library. A remote attacker may be able to bypass SAML authentication on a website using passport-saml. A successful attack requires that the attacker is in possession of an arbitrary IDP signed XML element. Depending on the IDP used, fully unauthenticated attacks (e.g without access to a valid user) might also be feasible if generation of a signed message can be triggered. Users should upgrade to passport-saml version 3.2.2 or newer. The issue was also present in the beta releases of `node-saml` before version 4.0.0-beta.5. If you cannot upgrade, disabling SAML authentication may be done as a workaround.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
密码学签名的验证不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Passport-SAML 数据伪造问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Passport-SAML是Passport的SAML 2.0身份验证提供程序,Node.js 身份验证库。 Passport-SAML存在数据伪造问题漏洞,该漏洞源于远程攻击者可以使用passport-saml绕过网站上的SAML身份验证。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
node-samlpassport-saml < 3.2.2 -

II. Public POCs for CVE-2022-39299

#POC DescriptionSource LinkShenlong Link
1A Simple CVE-2022-39299 PoC exploit generator to bypass authentication in SAML SSO Integrations using vulnerable versions of passport-samlhttps://github.com/doyensec/CVE-2022-39299_PoC_GeneratorPOC Details
2CVE-2022-39299 취약점에 대한 Research 정리https://github.com/KaztoRay/CVE-2022-39299-ResearchPOC Details
3CVE-2022-39299 취약점에 대한 Research 정리https://github.com/AventurineJun/CVE-2022-39299-ResearchPOC Details
4CVE-2022-39299 취약점에 대한 Research 정리https://github.com/Haruaventure/CVE-2022-39299-ResearchPOC Details
5CVE-2022-39299 취약점에 대한 Research 정리https://github.com/AventurineJ/CVE-2022-39299-ResearchPOC Details
6CVE-2022-39299 취약점에 대한 Research 정리https://github.com/Viperazor/CVE-2022-39299-ResearchPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2022-39299

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2022-39299

No comments yet


Leave a comment