passport-wsfed-saml2
. A successful attack requires that the attacker is in possession of an arbitrary signed WSFed assertion. Depending on the IDP used, fully unauthenticated attacks (e.g without access to a valid user) might also be feasible if generation of a signed message can be triggered.
passport-wsfed-saml2
library versions <4.6.3
.
SAML2 protocol is not affected.
>=4.6.3