漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Cross site scripting via missing binding syntax validation In ACS location in github.com/crewjam/saml
Vulnerability Description
github.com/crewjam/saml is a saml library for the go language. In affected versions the package does not validate the ACS Location URI according to the SAML binding being parsed. If abused, this flaw allows attackers to register malicious Service Providers at the IdP and inject Javascript in the ACS endpoint definition, achieving Cross-Site-Scripting (XSS) in the IdP context during the redirection at the end of a SAML SSO Flow. Consequently, an attacker may perform any authenticated action as the victim once the victim’s browser loaded the SAML IdP initiated SSO link for the malicious service provider. Note: SP registration is commonly an unrestricted operation in IdPs, hence not requiring particular permissions or publicly accessible to ease the IdP interoperability. This issue is fixed in version 0.4.14. Users unable to upgrade may perform external validation of URLs provided in SAML metadata, or restrict the ability for end-users to upload arbitrary metadata.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
Vulnerability Type
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
Vulnerability Title
SAML 跨站脚本漏洞
Vulnerability Description
SAML是Ross Kinder个人开发者的一个包含了 golang 中 saml 标准的部分实现的库。即允许第三方对您的用户进行身份验证,或允许第三者依靠我们对其用户进行身份认证。 SAML 0.4.14之前版本存在跨站脚本漏洞,该漏洞源于存在跨站脚本(XSS)漏洞。攻击者可利用该漏洞在ACS端点中注入Javascript代码。
CVSS Information
N/A
Vulnerability Type
N/A