Vulnerabilities > CVE-2023-40178 - Insufficient Session Expiration vulnerability in Node Saml Project Node Saml
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
LOW Summary
Node-SAML is a SAML library not dependent on any frameworks that runs in Node. The lack of checking of current timestamp allows a LogoutRequest XML to be reused multiple times even when the current time is past the NotOnOrAfter. This could impact the user where they would be logged out from an expired LogoutRequest. In bigger contexts, if LogoutRequests are sent out in mass to different SPs, this could impact many users on a large scale. This issue was patched in version 4.0.5.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
References
- https://github.com/node-saml/node-saml/commit/045e3b9c54211fdb95f96edf363679845b195cec
- https://github.com/node-saml/node-saml/commit/045e3b9c54211fdb95f96edf363679845b195cec
- https://github.com/node-saml/node-saml/releases/tag/v4.0.5
- https://github.com/node-saml/node-saml/releases/tag/v4.0.5
- https://github.com/node-saml/node-saml/security/advisories/GHSA-vx8m-6fhw-pccw
- https://github.com/node-saml/node-saml/security/advisories/GHSA-vx8m-6fhw-pccw