samlify@2.0.0-rc.3 vulnerabilities

High-level API for Single Sign On (SAML 2.0)

Direct Vulnerabilities

Known vulnerabilities in the samlify package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Improper Verification of Signature

samlify is a Highly configuarable Node.js SAML 2.0 library for Single Sign On.

Affected versions of this package are vulnerable to Improper Verification of Signature. An attacker could potentially wrap the signature of a SAML response, and insert a new username in the original token, making it appear as though a different user was authenticated.

How to fix Improper Verification of Signature?

Upgrade samlify to version 2.4.0 or higher.

<2.4.0
  • H
XML External Entity (XXE) Injection

samlify is a Node.js API for Single Sign On (SAML 2.0).

Affected versions of this package are vulnerable to XML Injection attack.

An XML Signature Wrapping vulnerability exists in Samlify 2.2.0 and earlier, and in predecessor Express-saml2 which could allow attackers to impersonate arbitrary users.

How to fix XML External Entity (XXE) Injection?

Upgrade to shiba version 2.3.0 or higher.

<2.3.0
  • H
XML External Entity (XXE) Injection

samlify is a Node.js API for Single Sign On (SAML 2.0).

Affected versions of this package are vulnerable to XML Injection attack.

An XML Signature Wrapping vulnerability exists in Samlify 2.2.0 and earlier, and in predecessor Express-saml2 which could allow attackers to impersonate arbitrary users.

How to fix XML External Entity (XXE) Injection?

Upgrade to shiba version 2.3.0 or higher.

<2.3.0