Insecure Token Validation Affecting sustainsys.saml2 package, versions [,1.0.2) [2.0.0,2.7.0)
Snyk CVSS
Attack Complexity
High
User Interaction
Required
Scope
Changed
Confidentiality
High
Threat Intelligence
EPSS
0.13% (48th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DOTNET-SUSTAINSYSSAML2-567167
- published 23 Apr 2020
- disclosed 21 Apr 2020
- credit Unknown
Introduced: 21 Apr 2020
CVE-2020-5268 Open this link in a new tabHow to fix?
Upgrade Sustainsys.Saml2
to version 1.0.2, 2.7.0 or higher.
Overview
Sustainsys.Saml2 is a SAML2 protocol support.
Affected versions of this package are vulnerable to Insecure Token Validation. It incorrectly treats all incoming tokens as bearer tokens, even though they have another subject confirmation method specified. This could be used by an attacker that could get access to Saml2 tokens with another subject confirmation method than bearer. The attacker could then use such a token to create a log in session.