You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
Auth bypass in SAML provider
Critical severity
GitHub Reviewed
Published
Dec 14, 2020
in
netlify/gotrue
•
Updated Jan 9, 2023
Impact
The following vulnerabilities have been disclosed, which impact users leveraging the SAML auth provider:
goxmldsig
- Signature Validation Bypassgosaml2
- Authentication BypassPatches
Patch available
Please upgrade to v1.0.0 or commit hash
a2b4dd6bc4ef7562d1df044098b303f564eefa90
Workarounds
No known workarounds.
For more information
If you have any questions or comments about this advisory:
References