Skip to content

Auth bypass in SAML provider

Critical severity GitHub Reviewed Published Dec 14, 2020 in netlify/gotrue • Updated Jan 9, 2023

Package

gomod github.com/netlify/gotrue (Go)

Affected versions

< 1.0.0

Patched versions

1.0.0

Description

Impact

The following vulnerabilities have been disclosed, which impact users leveraging the SAML auth provider:

Patches

Patch available

Please upgrade to v1.0.0 or commit hash a2b4dd6bc4ef7562d1df044098b303f564eefa90

Workarounds

No known workarounds.

For more information

If you have any questions or comments about this advisory:

References

@mraerino mraerino published to netlify/gotrue Dec 14, 2020
Reviewed May 21, 2021
Published to the GitHub Advisory Database Jun 23, 2021
Last updated Jan 9, 2023

Severity

Critical

Weaknesses

No CWEs

CVE ID

No known CVE

GHSA ID

GHSA-433w-mm6h-rv9p

Source code

No known source code

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.