Coordinated Disclosure Timeline
- 09/11/2020: Report sent to maintainers
- 09/11/2020: Maintainers acknowledged report receipt
- 12/11/2020: Notified maintainers about approaching deadline.
- 01/05/2021: Issue resolved
Summary
Saml2 is vulnerable to a Cross-Site Request Forgery (CSRF) that may lead per-user denial of service (DoS).
Product
Tested Version
The develop
branch.
Details
Issue: CSRF (CVE-2018-0785)
The application doesn’t have a fix for CVE-2018-0785 that was found in ASP.NET Core templates. It is vulnerable to CSRF. A logged-in user with enabled Second Factor Authentication (2FA) may lose their recovery codes if they are tricked into clicking a link like https://localhost:44315/manage/GenerateRecoveryCodes
or visit a malicious site that makes the request without the user’s consent. As a result the user may be permanently locked out of their account after losing access to their 2FA device, as the initial recovery codes would no longer be valid.
Impact
This issue may lead to a per-user DoS.
Credit
This issue was discovered and reported by GHSL team member @JarLob (Jaroslav Lobačevski).
Contact
You can contact the GHSL team at securitylab@github.com
, please include a reference to GHSL-2020-147
in any communication regarding this issue.