Published: Dec 12, 2022 CVE number: CVE-2022-23505Documentation Index
Fetch the complete documentation index at: https://docs-staging.auth0-mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
Overview
A remote attacker can bypass WSFed authentication on a website usingpassport-wsfed-saml2. A successful attack requires that the attacker is in possession of an arbitrary signed WSFed assertion. Depending on the IDP used, fully unauthenticated attacks (e.g without access to a valid user) might also be feasible if generation of a signed message can be triggered.
Am I affected?
You are affected if you are using WSFed protocol with thepassport-wsfed-saml2 library versions <4.6.3.
SAML2 protocol is not affected.
How to fix that?
Upgrade to version>=4.6.3