CVE-2018-5387: Improper Verification of Cryptographic Signature
(updated )
Wizkunde SAMLBase may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.
References
- duo.com/blog/duo-finds-saml-vulnerabilities-affecting-multiple-implementations
- github.com/GoGentoOSS/SAMLBase/commit/482cdf8c090e0f1179073034ebcb609ac7c3f5b3
- github.com/GoGentoOSS/SAMLBase/issues/3
- github.com/advisories/GHSA-7gh2-8q93-87hp
- nvd.nist.gov/vuln/detail/CVE-2018-5387
- www.kb.cert.org/vuls/id/475445
Detect and mitigate CVE-2018-5387 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →