Wizkunde SAMLBase may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.
{ "nvd_published_at": "2018-07-24T15:29:00Z", "cwe_ids": [ "CWE-347" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2023-07-07T19:21:30Z" }