Due to issues in Go's standard library XML parsing, a valid SAML response may be mutated by an attacker to modify the trusted document. This can result in allowing unverified logins from a SAML IdP.
Users that configure Fleet with SSO login may be vulnerable to this issue.
This issue is patched in 3.5.1 using https://github.com/mattermost/xml-roundtrip-validator.
If upgrade to 3.5.1 is not possible, users should disable SSO authentication in Fleet.
See https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/ for more information about the underlying vulnerabilities.
If you have any questions or comments about this advisory: * Email us at security@fleetdm.com * Join #fleet in osquery Slack
{ "nvd_published_at": "2020-12-17T20:15:00Z", "cwe_ids": [ "CWE-290" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2021-05-21T20:46:21Z" }