Spring Security versions 5.2.x prior to 5.2.4 and 5.3.x prior to 5.3.2 contain a signature wrapping vulnerability during SAML response validation. When using the spring-security-saml2-service-provider component, a malicious user can carefully modify an otherwise valid SAML response and append an arbitrary assertion that Spring Security will accept as valid.
{ "nvd_published_at": "2020-05-13T17:15:00Z", "github_reviewed_at": "2020-06-04T19:19:34Z", "severity": "HIGH", "github_reviewed": true, "cwe_ids": [ "CWE-347" ] }