Lucene search

K
githubexploit44B92078-AA38-54DE-868C-A87FB237583A
HistoryOct 31, 2022 - 1:24 p.m.

Exploit for Improper Verification of Cryptographic Signature in Passport-Saml Project Passport-Saml

2022-10-3113:24:34
409
passport-saml
saml sso
cve-2022-39299
multi-tenant apps
authentication bypass
xml signature
remote attacker
doyensec
proof of concept
poc generator
validatepostresponse function
passport-saml-2.0.0
xml parser
xpath
authentication logic

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.009

Percentile

83.1%

Exploiting CVE-2022-39299

Signature bypass via multiple ro…

This is an article that belongs to githubexploit private collection.
Please sign in to get more Information.

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.009

Percentile

83.1%