{"uuid": "b751a7d3-4556-4c75-828f-34aff4e800ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-39299", "type": "seen", "source": "https://t.me/arpsyndicate/2660", "content": "#ExploitObserverAlert\n\nCVE-2022-39299\n\nDESCRIPTION: Exploit Observer has 7 entries related to CVE-2022-39299. Passport-SAML is a SAML 2.0 authentication provider for Passport, the Node.js authentication library. A remote attacker may be able to bypass SAML authentication on a website using passport-saml. A successful attack requires that the attacker is in possession of an arbitrary IDP signed XML element. Depending on the IDP used, fully unauthenticated attacks (e.g without access to a valid user) might also be feasible if generation of a signed message can be triggered. Users should upgrade to passport-saml version 3.2.2 or newer. The issue was also present in the beta releases of `node-saml` before version 4.0.0-beta.5. If you cannot upgrade, disabling SAML authentication may be done as a workaround.\n\nFIRST-EPSS: 0.007470000\nNVD-IS: 5.9\nNVD-ES: 2.2", "creation_timestamp": "2024-01-08T17:25:59.000000Z"}