It was discovered that Lasso did not properly verify that all assertions in a SAML response were properly signed. An attacker could possibly use this to impersonate users or otherwise bypass access controls.
{ "binaries": [ { "binary_name": "liblasso-perl", "binary_version": "2.5.1-0ubuntu1.2" }, { "binary_name": "liblasso3", "binary_version": "2.5.1-0ubuntu1.2" }, { "binary_name": "liblasso3-dev", "binary_version": "2.5.1-0ubuntu1.2" }, { "binary_name": "python-lasso", "binary_version": "2.5.1-0ubuntu1.2" }, { "binary_name": "python3-lasso", "binary_version": "2.5.1-0ubuntu1.2" } ], "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "liblasso-perl", "binary_version": "2.6.0-7ubuntu1.2" }, { "binary_name": "liblasso3", "binary_version": "2.6.0-7ubuntu1.2" }, { "binary_name": "liblasso3-dev", "binary_version": "2.6.0-7ubuntu1.2" }, { "binary_name": "python3-lasso", "binary_version": "2.6.0-7ubuntu1.2" } ], "availability": "No subscription required" }