{"api_version":"1","generated_at":"2026-04-23T09:50:56+00:00","cve":"CVE-2017-16897","urls":{"html":"https://cve.report/CVE-2017-16897","api":"https://cve.report/api/cve/CVE-2017-16897.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2017-16897","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2017-16897"},"summary":{"title":"CVE-2017-16897","description":"A vulnerability has been discovered in the Auth0 passport-wsfed-saml2 library affecting versions < 3.0.5. This vulnerability allows an attacker to impersonate another user and potentially elevate their privileges if the SAML identity provider does not sign the full SAML response (e.g., only signs the assertion within the response).","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2017-12-27 17:08:00","updated_at":"2019-10-03 00:03:00"},"problem_types":["CWE-290"],"metrics":[],"references":[{"url":"https://auth0.com/docs/security/bulletins/cve-2017-16897","name":"https://auth0.com/docs/security/bulletins/cve-2017-16897","refsource":"CONFIRM","tags":["Vendor Advisory"],"title":"CVE-2017-16897: Security Update for passport-wsfed-saml2 Passport Strategy Library","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2017-16897","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-16897","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2017","cve_id":"16897","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"auth0","cpe5":"passport-wsfed-saml2","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"16897","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"auth0","cpe5":"passport-wsfed-saml2","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2017-16897","qid":"981233","title":"Nodejs (npm) Security Update for passport-wsfed-saml2 (GHSA-7fpw-cfc4-3p2c)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2017-16897","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A vulnerability has been discovered in the Auth0 passport-wsfed-saml2 library affecting versions < 3.0.5. This vulnerability allows an attacker to impersonate another user and potentially elevate their privileges if the SAML identity provider does not sign the full SAML response (e.g., only signs the assertion within the response)."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"https://auth0.com/docs/security/bulletins/cve-2017-16897","refsource":"CONFIRM","url":"https://auth0.com/docs/security/bulletins/cve-2017-16897"}]}},"nvd":{"publishedDate":"2017-12-27 17:08:00","lastModifiedDate":"2019-10-03 00:03:00","problem_types":["CWE-290"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH"},"exploitabilityScore":2.2,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:C/I:C/A:C","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":9.3},"severity":"HIGH","exploitabilityScore":8.6,"impactScore":10,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:auth0:passport-wsfed-saml2:*:*:*:*:*:*:*:*","versionEndExcluding":"3.0.5","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2017","CveId":"16897","Ordinal":"114801","Title":"CVE-2017-16897","CVE":"CVE-2017-16897","Year":"2017"},"notes":[{"CveYear":"2017","CveId":"16897","Ordinal":"1","NoteData":"A vulnerability has been discovered in the Auth0 passport-wsfed-saml2 library affecting versions < 3.0.5. This vulnerability allows an attacker to impersonate another user and potentially elevate their privileges if the SAML identity provider does not sign the full SAML response (e.g., only signs the assertion within the response).","Type":"Description","Title":null},{"CveYear":"2017","CveId":"16897","Ordinal":"2","NoteData":"2017-12-23","Type":"Other","Title":"Published"},{"CveYear":"2017","CveId":"16897","Ordinal":"3","NoteData":"2017-12-23","Type":"Other","Title":"Modified"}]}}}