High severityNVD Advisory· Published Jul 24, 2018· Updated Sep 16, 2024
CVE-2018-5387
CVE-2018-5387
Description
Wizkunde SAMLBase may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
gogentooss/samlbasePackagist | < 1.2.7 | 1.2.7 |
Affected products
1Patches
1482cdf8c090eVulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
6- github.com/advisories/GHSA-7gh2-8q93-87hpghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2018-5387ghsaADVISORY
- www.kb.cert.org/vuls/id/475445ghsathird-party-advisoryx_refsource_CERT-VNWEB
- duo.com/blog/duo-finds-saml-vulnerabilities-affecting-multiple-implementationsghsax_refsource_MISCWEB
- github.com/GoGentoOSS/SAMLBase/commit/482cdf8c090e0f1179073034ebcb609ac7c3f5b3ghsax_refsource_CONFIRMWEB
- github.com/GoGentoOSS/SAMLBase/issues/3ghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.