-
Notifications
You must be signed in to change notification settings - Fork 61
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Aliases: CVE-2023-45683, GHSA-267v-3v32-g6q5 Fixes #2114 Change-Id: I56640223c8858f9f176dbec77e99e1f3b330180c Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/537136 Run-TryBot: Tatiana Bradley <[email protected]> TryBot-Result: Gopher Robot <[email protected]> Reviewed-by: Damien Neil <[email protected]>
- Loading branch information
Showing
2 changed files
with
88 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,58 @@ | ||
{ | ||
"schema_version": "1.3.1", | ||
"id": "GO-2023-2114", | ||
"modified": "0001-01-01T00:00:00Z", | ||
"published": "0001-01-01T00:00:00Z", | ||
"aliases": [ | ||
"CVE-2023-45683", | ||
"GHSA-267v-3v32-g6q5" | ||
], | ||
"summary": "Cross-site scripting via missing binding syntax validation in github.com/crewjam/saml", | ||
"details": "The package does not validate the ACS Location URI according to the SAML binding being parsed. If abused, this flaw allows attackers to register malicious Service Providers at the IdP and inject Javascript in the ACS endpoint definition, achieving Cross-Site-Scripting (XSS) in the IdP context during the redirection at the end of a SAML SSO Flow. Consequently, an attacker may perform any authenticated action as the victim once the victim's browser loads the SAML IdP initiated SSO link for the malicious service provider.", | ||
"affected": [ | ||
{ | ||
"package": { | ||
"name": "github.com/crewjam/saml", | ||
"ecosystem": "Go" | ||
}, | ||
"ranges": [ | ||
{ | ||
"type": "SEMVER", | ||
"events": [ | ||
{ | ||
"introduced": "0" | ||
}, | ||
{ | ||
"fixed": "0.4.14" | ||
} | ||
] | ||
} | ||
], | ||
"ecosystem_specific": { | ||
"imports": [ | ||
{ | ||
"path": "github.com/crewjam/saml" | ||
} | ||
] | ||
} | ||
} | ||
], | ||
"references": [ | ||
{ | ||
"type": "ADVISORY", | ||
"url": "https://github.com/crewjam/saml/security/advisories/GHSA-267v-3v32-g6q5" | ||
}, | ||
{ | ||
"type": "FIX", | ||
"url": "https://github.com/crewjam/saml/commit/b07b16cf83c4171d16da4d85608cb827f183cd79" | ||
} | ||
], | ||
"credits": [ | ||
{ | ||
"name": "Francesco Lacerenza from Doyensec" | ||
} | ||
], | ||
"database_specific": { | ||
"url": "https://pkg.go.dev/vuln/GO-2023-2114" | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,30 @@ | ||
id: GO-2023-2114 | ||
modules: | ||
- module: github.com/crewjam/saml | ||
versions: | ||
- fixed: 0.4.14 | ||
vulnerable_at: 0.4.13 | ||
packages: | ||
- package: github.com/crewjam/saml | ||
summary: |- | ||
Cross-site scripting via missing binding syntax validation in | ||
github.com/crewjam/saml | ||
description: |- | ||
The package does not validate the ACS Location URI according to the SAML binding | ||
being parsed. If abused, this flaw allows attackers to register malicious | ||
Service Providers at the IdP and inject Javascript in the ACS endpoint | ||
definition, achieving Cross-Site-Scripting (XSS) in the IdP context during the | ||
redirection at the end of a SAML SSO Flow. Consequently, an attacker may perform | ||
any authenticated action as the victim once the victim's browser loads the SAML | ||
IdP initiated SSO link for the malicious service provider. | ||
cves: | ||
- CVE-2023-45683 | ||
ghsas: | ||
- GHSA-267v-3v32-g6q5 | ||
credits: | ||
- Francesco Lacerenza from Doyensec | ||
references: | ||
- advisory: https://github.com/crewjam/saml/security/advisories/GHSA-267v-3v32-g6q5 | ||
- fix: https://github.com/crewjam/saml/commit/b07b16cf83c4171d16da4d85608cb827f183cd79 | ||
notes: | ||
- The fix introduced functions Endpoint.UnmarshalXML and IndexedEndpoint.UnmarshalXML, but we currently do not have a way to mark uses of xml.Unmarshal on a certain type as vulnerable. |