Dex is a federated OpenID Connect provider written in Go. In Dex before version 2.27.0 there is a critical set of vulnerabilities which impacts users leveraging the SAML connector. The vulnerabilities enables potential signature bypass due to issues with XML encoding in the underlying Go library. The vulnerabilities have been addressed in version 2.27.0 by using the xml-roundtrip-validator from Mattermost (see related references).
References
Link | Resource |
---|---|
https://github.com/dexidp/dex/security/advisories/GHSA-m9hp-7r99-94h5 | Third Party Advisory |
https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-attributes.md | Not Applicable Third Party Advisory |
https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-directives.md | Not Applicable Third Party Advisory |
https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/ | Not Applicable Third Party Advisory |
https://github.com/dexidp/dex/releases/tag/v2.27.0 | Third Party Advisory |
https://github.com/dexidp/dex/commit/324b1c886b407594196113a3dbddebe38eecd4e8 | Patch Third Party Advisory |
https://github.com/russellhaering/goxmldsig/security/advisories/GHSA-q547-gmf8-8jr7 | Not Applicable Third Party Advisory |
https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-elements.md | Not Applicable Third Party Advisory |
Configurations
Information
Published : 2020-12-28 12:15
Updated : 2020-12-30 07:12
NVD link : CVE-2020-26290
Mitre link : CVE-2020-26290
JSON object : View
CWE
CWE-347
Improper Verification of Cryptographic Signature
Products Affected
linuxfoundation
- dex