{"schema_version":"1.3.1","id":"GO-2022-1129","modified":"2024-05-20T16:03:47Z","published":"2022-11-29T18:03:21Z","aliases":["CVE-2022-41912","GHSA-j2jp-wvqg-wc2g"],"summary":"Authentication bypass in github.com/crewjam/saml","details":"Authentication bypass is possible when processing SAML responses containing multiple Assertion elements.","affected":[{"package":{"name":"github.com/crewjam/saml","ecosystem":"Go"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"0.4.9"}]}],"ecosystem_specific":{"imports":[{"path":"github.com/crewjam/saml","symbols":["ServiceProvider.ParseResponse","ServiceProvider.ParseXMLArtifactResponse","ServiceProvider.ParseXMLResponse","ServiceProvider.ValidateLogoutResponseForm","ServiceProvider.ValidateLogoutResponseRedirect","ServiceProvider.ValidateLogoutResponseRequest","ServiceProvider.validateSignature","findChild"]}]}}],"references":[{"type":"ADVISORY","url":"https://github.com/prometheus/exporter-toolkit/security/advisories/GHSA-7rg2-cxvp-9p7p"},{"type":"FIX","url":"https://github.com/crewjam/saml/commit/aee3fb1edeeaf1088fcb458727e0fd863d277f8b"}],"credits":[{"name":"Felix Wilhelm from Google Project Zero"}],"database_specific":{"url":"https://pkg.go.dev/vuln/GO-2022-1129","review_status":"REVIEWED"}}