First published: Wed Dec 27 2017(Updated: )
A vulnerability has been discovered in the Auth0 passport-wsfed-saml2 library affecting versions < 3.0.5. This vulnerability allows an attacker to impersonate another user and potentially elevate their privileges if the SAML identity provider does not sign the full SAML response (e.g., only signs the assertion within the response).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Auth0 passport-wsfed-saml2 | <3.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-16897 has been classified as a high severity vulnerability due to its potential for user impersonation and privilege escalation.
To fix CVE-2017-16897, upgrade the Auth0 passport-wsfed-saml2 library to version 3.0.5 or later.
CVE-2017-16897 affects the Auth0 passport-wsfed-saml2 library in all versions prior to 3.0.5.
CVE-2017-16897 is a security vulnerability that allows for user impersonation and potentially enables privilege escalation.
The potential impacts of CVE-2017-16897 include unauthorized access to user accounts and escalation of privileges within the application.