CVE-2020-26290

9.3 CRITICAL

📋 TL;DR

This vulnerability in Dex's SAML connector allows attackers to bypass XML signature validation through XML encoding issues in the underlying Go library. This enables authentication bypass and potential account takeover for users relying on SAML authentication. Only organizations using Dex with SAML connectors are affected.

💻 Affected Systems

Products:
  • Dex
Versions: All versions before 2.27.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects deployments using SAML connectors. OIDC and other connectors are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete authentication bypass allowing attackers to impersonate any user, gain unauthorized access to federated applications, and potentially escalate privileges across connected systems.

🟠

Likely Case

Authentication bypass enabling unauthorized access to applications using Dex as an identity provider via SAML, potentially leading to data exposure and privilege escalation.

🟢

If Mitigated

With proper network segmentation and monitoring, impact is limited to authentication bypass for specific applications using vulnerable SAML connectors.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires understanding of SAML XML manipulation and access to SAML authentication flow.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.27.0

Vendor Advisory: https://github.com/dexidp/dex/security/advisories/GHSA-m9hp-7r99-94h5

Restart Required: Yes

Instructions:

1. Stop Dex service. 2. Update to version 2.27.0 or later. 3. Restart Dex service. 4. Verify SAML authentication works correctly.

🔧 Temporary Workarounds

Disable SAML Connectors

all

Temporarily disable all SAML connectors if they are not essential for operations

Edit Dex configuration to remove or comment out SAML connector sections

🧯 If You Can't Patch

  • Implement network-level controls to restrict access to Dex SAML endpoints
  • Enable detailed logging and monitoring for SAML authentication attempts

🔍 How to Verify

Check if Vulnerable:

Check Dex version and configuration for SAML connector usage. If version < 2.27.0 and SAML connectors are enabled, system is vulnerable.

Check Version:

dex version

Verify Fix Applied:

Verify Dex version is 2.27.0 or later and test SAML authentication flow with signature validation.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SAML authentication patterns
  • Failed signature validation attempts followed by successful authentication
  • Authentication from unexpected sources

Network Indicators:

  • Unusual XML payloads in SAML requests
  • Malformed XML in authentication flows

SIEM Query:

source="dex" AND (saml_failure OR xml_validation_error) AND auth_success

🔗 References

📤 Share & Export