Passport-saml is vulnerable to improper cryptographic signature verification. A remote attacker is able to bypass SAML authentication via an arbitrary IDP signed XML element, due to improper checks for a valid top-level signature in saml.ts
.
packetstormsecurity.com/files/169826/Node-saml-Root-Element-Signature-Bypass.html
github.com/advisories/GHSA-m974-647v-whv7
github.com/node-saml/passport-saml/commit/8b7e3f5a91c8e5ac7e890a0c90bc7491ce33155e
github.com/node-saml/passport-saml/issues/790
github.com/node-saml/passport-saml/releases/tag/v3.2.2
github.com/node-saml/passport-saml/security/advisories/GHSA-m974-647v-whv7