Loading HuntDB...

GHSA-ppjq-qxhx-m25f

GitHub Security Advisory

Authentication Bypass for passport-wsfed-saml2

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

# Overview
A remote attacker can bypass WSFed authentication on a website using passport-wsfed-saml2. A successful attack requires that the attacker is in possession of an arbitrary IDP signed WSFed assertion. Depending on the IDP used, fully unauthenticated attacks (e.g without access to a valid user) might also be feasible if generation of a signed message can be triggered.

# Am I affected?
You are affected if you are using WSFed protocol with the passport-wsfed-saml2 library versions < 4.6.3.
SAML2 protocol is not affected.

# How do I fix it?
Upgrade the library to version 4.6.3.

# Will the fix impact my users?
No, the fix will not impact your users.

Affected Packages

npm passport-wsfed-saml2
Affected versions: 0 (fixed in 4.6.3)

Related CVEs

Key Information

GHSA ID
GHSA-ppjq-qxhx-m25f
Published
December 13, 2022 5:16 PM
Last Modified
December 15, 2022 9:59 PM
CVSS Score
5.0 /10
Primary Ecosystem
npm
Primary Package
passport-wsfed-saml2
GitHub Reviewed
✓ Yes

Dataset

Last updated: July 12, 2025 6:29 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.