CVE-2020-26290: Improper Verification of Cryptographic Signature
Dex is a federated OpenID Connect provider written in Go. In Dex before version 2.27.0 there is a critical set of vulnerabilities which impacts users leveraging the SAML connector. The vulnerabilities enables potential signature bypass due to issues with XML encoding in the underlying Go library. The vulnerabilities have been addressed in version 2.27.0 by using the xml-roundtrip-validator from Mattermost (see related references).
References
- github.com/advisories/GHSA-m9hp-7r99-94h5
- github.com/dexidp/dex/commit/324b1c886b407594196113a3dbddebe38eecd4e8
- github.com/dexidp/dex/releases/tag/v2.27.0
- github.com/dexidp/dex/security/advisories/GHSA-m9hp-7r99-94h5
- github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-attributes.md
- github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-directives.md
- github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-elements.md
- github.com/russellhaering/goxmldsig/security/advisories/GHSA-q547-gmf8-8jr7
- nvd.nist.gov/vuln/detail/CVE-2020-26290
Detect and mitigate CVE-2020-26290 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →