Auth bypass in SAML provider
Package
Affected versions
< 1.0.0
Patched versions
1.0.0
Description
Reviewed
May 21, 2021
Published to the GitHub Advisory Database
Jun 23, 2021
Last updated
Jan 9, 2023
Impact
The following vulnerabilities have been disclosed, which impact users leveraging the SAML auth provider:
goxmldsig
- Signature Validation Bypassgosaml2
- Authentication BypassPatches
Patch available
Please upgrade to v1.0.0 or commit hash
a2b4dd6bc4ef7562d1df044098b303f564eefa90
Workarounds
No known workarounds.
For more information
If you have any questions or comments about this advisory:
References