The package github.com/tyktechnologies/tyk-identity-broker before 1.1.1 are vulnerable to Authentication Bypass via the Go XML parser which can cause SAML authentication bypass. This is because the XML parser doesn’t guarantee integrity in the XML round-trip (encoding/decoding XML data).
References
Configurations
History
21 Nov 2024, 05:51
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 5.5
v3 : 4.8 |
References | () https://github.com/TykTechnologies/tyk-identity-broker/commit/243092965b0f93a95a14cb882b5b9a3df61dd5c0 - Patch, Third Party Advisory | |
References | () https://github.com/TykTechnologies/tyk-identity-broker/commit/46f70420e0911e4e8b638575e29d394c227c75d0 - Patch, Third Party Advisory | |
References | () https://github.com/TykTechnologies/tyk-identity-broker/pull/147 - Patch, Third Party Advisory | |
References | () https://github.com/TykTechnologies/tyk-identity-broker/releases/tag/v1.1.1 - Release Notes, Third Party Advisory | |
References | () https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMTYKTECHNOLOGIESTYKIDENTITYBROKER-1089720 - Third Party Advisory |
Information
Published : 2021-04-26 10:15
Updated : 2024-11-21 05:51
NVD link : CVE-2021-23365
Mitre link : CVE-2021-23365
CVE.ORG link : CVE-2021-23365
JSON object : View
Products Affected
tyk
- tyk-identity-broker
CWE
CWE-287
Improper Authentication