GSD-2020-26290
Vulnerability from gsd - Updated: 2023-12-13 01:22Details
Dex is a federated OpenID Connect provider written in Go. In Dex before version 2.27.0 there is a critical set of vulnerabilities which impacts users leveraging the SAML connector. The vulnerabilities enables potential signature bypass due to issues with XML encoding in the underlying Go library. The vulnerabilities have been addressed in version 2.27.0 by using the xml-roundtrip-validator from Mattermost (see related references).
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2020-26290",
"description": "Dex is a federated OpenID Connect provider written in Go. In Dex before version 2.27.0 there is a critical set of vulnerabilities which impacts users leveraging the SAML connector. The vulnerabilities enables potential signature bypass due to issues with XML encoding in the underlying Go library. The vulnerabilities have been addressed in version 2.27.0 by using the xml-roundtrip-validator from Mattermost (see related references).",
"id": "GSD-2020-26290",
"references": [
"https://www.suse.com/security/cve/CVE-2020-26290.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2020-26290"
],
"details": "Dex is a federated OpenID Connect provider written in Go. In Dex before version 2.27.0 there is a critical set of vulnerabilities which impacts users leveraging the SAML connector. The vulnerabilities enables potential signature bypass due to issues with XML encoding in the underlying Go library. The vulnerabilities have been addressed in version 2.27.0 by using the xml-roundtrip-validator from Mattermost (see related references).",
"id": "GSD-2020-26290",
"modified": "2023-12-13T01:22:08.712061Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2020-26290",
"STATE": "PUBLIC",
"TITLE": "Critical security issues in XML encoding in Dex"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "dex",
"version": {
"version_data": [
{
"version_value": "\u003c 2.27.0"
}
]
}
}
]
},
"vendor_name": "dexidp"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Dex is a federated OpenID Connect provider written in Go. In Dex before version 2.27.0 there is a critical set of vulnerabilities which impacts users leveraging the SAML connector. The vulnerabilities enables potential signature bypass due to issues with XML encoding in the underlying Go library. The vulnerabilities have been addressed in version 2.27.0 by using the xml-roundtrip-validator from Mattermost (see related references)."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-347: Improper Verification of Cryptographic Signature"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-directives.md",
"refsource": "MISC",
"url": "https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-directives.md"
},
{
"name": "https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-elements.md",
"refsource": "MISC",
"url": "https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-elements.md"
},
{
"name": "https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-attributes.md",
"refsource": "MISC",
"url": "https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-attributes.md"
},
{
"name": "https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/",
"refsource": "MISC",
"url": "https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/"
},
{
"name": "https://github.com/dexidp/dex/security/advisories/GHSA-m9hp-7r99-94h5",
"refsource": "CONFIRM",
"url": "https://github.com/dexidp/dex/security/advisories/GHSA-m9hp-7r99-94h5"
},
{
"name": "https://github.com/russellhaering/goxmldsig/security/advisories/GHSA-q547-gmf8-8jr7",
"refsource": "MISC",
"url": "https://github.com/russellhaering/goxmldsig/security/advisories/GHSA-q547-gmf8-8jr7"
},
{
"name": "https://github.com/dexidp/dex/commit/324b1c886b407594196113a3dbddebe38eecd4e8",
"refsource": "MISC",
"url": "https://github.com/dexidp/dex/commit/324b1c886b407594196113a3dbddebe38eecd4e8"
},
{
"name": "https://github.com/dexidp/dex/releases/tag/v2.27.0",
"refsource": "MISC",
"url": "https://github.com/dexidp/dex/releases/tag/v2.27.0"
}
]
},
"source": {
"advisory": "GHSA-m9hp-7r99-94h5",
"discovery": "UNKNOWN"
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "\u003cv2.27.0",
"affected_versions": "All versions before 2.27.0",
"cvss_v2": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"cwe_ids": [
"CWE-1035",
"CWE-347",
"CWE-937"
],
"date": "2020-12-30",
"description": "Dex is a federated OpenID Connect provider written in Go. In Dex there is a critical set of vulnerabilities which impacts users leveraging the SAML connector. The vulnerabilities enables potential signature bypass due to issues with XML encoding in the underlying Go library. The vulnerabilities have been addressed by using the xml-roundtrip-validator from Mattermost (see related references).",
"fixed_versions": [
"v2.27.0"
],
"identifier": "CVE-2020-26290",
"identifiers": [
"CVE-2020-26290",
"GHSA-m9hp-7r99-94h5"
],
"not_impacted": "All versions starting from 2.27.0",
"package_slug": "go/github.com/dexidp/dex",
"pubdate": "2020-12-28",
"solution": "Upgrade to version 2.27.0 or higher.",
"title": "Improper Verification of Cryptographic Signature",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2020-26290"
],
"uuid": "b573314f-62cb-48b6-a6bd-1f37069763ad",
"versions": [
{
"commit": {
"sha": "0efc245900a3f2e07cbe0b53e959e1f8f820c2f8",
"tags": [
"v2.27.0"
],
"timestamp": "20201214084049"
},
"number": "v2.27.0"
}
]
},
{
"affected_range": "\u003e=2.1.0 \u003c2.27.0",
"affected_versions": "All versions starting from 2.1.0 before 2.27.0",
"cvss_v2": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"cwe_ids": [
"CWE-1035",
"CWE-347",
"CWE-707",
"CWE-937"
],
"date": "2021-12-20",
"description": "Dex is a federated OpenID Connect provider written in Go. In Dex before version 2.27.0 there is a critical set of vulnerabilities which impacts users leveraging the SAML connector. The vulnerabilities enables potential signature bypass due to issues with XML encoding in the underlying Go library. The vulnerabilities have been addressed in version 2.27.0 by using the xml-roundtrip-validator from Mattermost (see related references).",
"fixed_versions": [
"2.27.0"
],
"identifier": "CVE-2020-26290",
"identifiers": [
"GHSA-m9hp-7r99-94h5",
"CVE-2020-26290"
],
"not_impacted": "All versions before 2.1.0, all versions starting from 2.27.0",
"package_slug": "go/github.com/dexidp/dex/connector/saml",
"pubdate": "2021-12-20",
"solution": "Upgrade to version 2.27.0 or above.",
"title": "Improper Verification of Cryptographic Signature",
"urls": [
"https://github.com/dexidp/dex/security/advisories/GHSA-m9hp-7r99-94h5",
"https://github.com/russellhaering/goxmldsig/security/advisories/GHSA-q547-gmf8-8jr7",
"https://nvd.nist.gov/vuln/detail/CVE-2020-26290",
"https://github.com/dexidp/dex/commit/324b1c886b407594196113a3dbddebe38eecd4e8",
"https://github.com/dexidp/dex/releases/tag/v2.27.0",
"https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-attributes.md",
"https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-directives.md",
"https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-elements.md",
"https://github.com/advisories/GHSA-m9hp-7r99-94h5"
],
"uuid": "e9c291a1-0a6f-465b-b0da-139a6efd8a93"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:linuxfoundation:dex:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.27.0",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2020-26290"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Dex is a federated OpenID Connect provider written in Go. In Dex before version 2.27.0 there is a critical set of vulnerabilities which impacts users leveraging the SAML connector. The vulnerabilities enables potential signature bypass due to issues with XML encoding in the underlying Go library. The vulnerabilities have been addressed in version 2.27.0 by using the xml-roundtrip-validator from Mattermost (see related references)."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-347"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/dexidp/dex/security/advisories/GHSA-m9hp-7r99-94h5",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/dexidp/dex/security/advisories/GHSA-m9hp-7r99-94h5"
},
{
"name": "https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-attributes.md",
"refsource": "MISC",
"tags": [
"Not Applicable",
"Third Party Advisory"
],
"url": "https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-attributes.md"
},
{
"name": "https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-directives.md",
"refsource": "MISC",
"tags": [
"Not Applicable",
"Third Party Advisory"
],
"url": "https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-directives.md"
},
{
"name": "https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/",
"refsource": "MISC",
"tags": [
"Not Applicable",
"Third Party Advisory"
],
"url": "https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/"
},
{
"name": "https://github.com/dexidp/dex/releases/tag/v2.27.0",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/dexidp/dex/releases/tag/v2.27.0"
},
{
"name": "https://github.com/dexidp/dex/commit/324b1c886b407594196113a3dbddebe38eecd4e8",
"refsource": "MISC",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/dexidp/dex/commit/324b1c886b407594196113a3dbddebe38eecd4e8"
},
{
"name": "https://github.com/russellhaering/goxmldsig/security/advisories/GHSA-q547-gmf8-8jr7",
"refsource": "MISC",
"tags": [
"Not Applicable",
"Third Party Advisory"
],
"url": "https://github.com/russellhaering/goxmldsig/security/advisories/GHSA-q547-gmf8-8jr7"
},
{
"name": "https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-elements.md",
"refsource": "MISC",
"tags": [
"Not Applicable",
"Third Party Advisory"
],
"url": "https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-elements.md"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
}
},
"lastModifiedDate": "2020-12-30T15:12Z",
"publishedDate": "2020-12-28T20:15Z"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…