Skip to content

Commit

Permalink
data/reports: add GO-2023-2114.yaml
Browse files Browse the repository at this point in the history
Aliases: CVE-2023-45683, GHSA-267v-3v32-g6q5

Fixes #2114

Change-Id: I56640223c8858f9f176dbec77e99e1f3b330180c
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/537136
Run-TryBot: Tatiana Bradley <[email protected]>
TryBot-Result: Gopher Robot <[email protected]>
Reviewed-by: Damien Neil <[email protected]>
  • Loading branch information
tatianab committed Oct 24, 2023
1 parent 7cda312 commit 77412bb
Show file tree
Hide file tree
Showing 2 changed files with 88 additions and 0 deletions.
58 changes: 58 additions & 0 deletions data/osv/GO-2023-2114.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,58 @@
{
"schema_version": "1.3.1",
"id": "GO-2023-2114",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2023-45683",
"GHSA-267v-3v32-g6q5"
],
"summary": "Cross-site scripting via missing binding syntax validation in github.com/crewjam/saml",
"details": "The package does not validate the ACS Location URI according to the SAML binding being parsed. If abused, this flaw allows attackers to register malicious Service Providers at the IdP and inject Javascript in the ACS endpoint definition, achieving Cross-Site-Scripting (XSS) in the IdP context during the redirection at the end of a SAML SSO Flow. Consequently, an attacker may perform any authenticated action as the victim once the victim's browser loads the SAML IdP initiated SSO link for the malicious service provider.",
"affected": [
{
"package": {
"name": "github.com/crewjam/saml",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.4.14"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/crewjam/saml"
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/crewjam/saml/security/advisories/GHSA-267v-3v32-g6q5"
},
{
"type": "FIX",
"url": "https://github.com/crewjam/saml/commit/b07b16cf83c4171d16da4d85608cb827f183cd79"
}
],
"credits": [
{
"name": "Francesco Lacerenza from Doyensec"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2023-2114"
}
}
30 changes: 30 additions & 0 deletions data/reports/GO-2023-2114.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,30 @@
id: GO-2023-2114
modules:
- module: github.com/crewjam/saml
versions:
- fixed: 0.4.14
vulnerable_at: 0.4.13
packages:
- package: github.com/crewjam/saml
summary: |-
Cross-site scripting via missing binding syntax validation in
github.com/crewjam/saml
description: |-
The package does not validate the ACS Location URI according to the SAML binding
being parsed. If abused, this flaw allows attackers to register malicious
Service Providers at the IdP and inject Javascript in the ACS endpoint
definition, achieving Cross-Site-Scripting (XSS) in the IdP context during the
redirection at the end of a SAML SSO Flow. Consequently, an attacker may perform
any authenticated action as the victim once the victim's browser loads the SAML
IdP initiated SSO link for the malicious service provider.
cves:
- CVE-2023-45683
ghsas:
- GHSA-267v-3v32-g6q5
credits:
- Francesco Lacerenza from Doyensec
references:
- advisory: https://github.com/crewjam/saml/security/advisories/GHSA-267v-3v32-g6q5
- fix: https://github.com/crewjam/saml/commit/b07b16cf83c4171d16da4d85608cb827f183cd79
notes:
- The fix introduced functions Endpoint.UnmarshalXML and IndexedEndpoint.UnmarshalXML, but we currently do not have a way to mark uses of xml.Unmarshal on a certain type as vulnerable.

0 comments on commit 77412bb

Please sign in to comment.