{"id":"CVE-2020-27846","details":"A signature verification vulnerability exists in crewjam/saml. This flaw allows an attacker to bypass SAML Authentication. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.","aliases":["BIT-grafana-2020-27846","GHSA-4hq8-gmxx-h6w9","GO-2021-0058"],"modified":"2026-04-10T04:26:40.279335Z","published":"2020-12-21T16:15:13.067Z","related":["GHSA-4hq8-gmxx-h6w9"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YUTKIRWT6TWU7DS6GF3EOANVQBFQZYI/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ICP3YRY2VUCNCF2VFUSK77ZMRIC77FEM/"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20210205-0002/"},{"type":"ADVISORY","url":"https://github.com/crewjam/saml/security/advisories/GHSA-4hq8-gmxx-h6w9"},{"type":"ADVISORY","url":"https://grafana.com/blog/2020/12/17/grafana-6.7.5-7.2.3-and-7.3.6-released-with-important-security-fix-for-grafana-enterprise/"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1907670"},{"type":"EVIDENCE","url":"https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/crewjam/saml","events":[{"introduced":"0"},{"fixed":"0dd2422c212ea42de10cf84ca33e8dbe404b1bee"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"0.4.3"}]}},{"type":"GIT","repo":"https://github.com/grafana/grafana","events":[{"introduced":"0"},{"fixed":"2718859d69ca456447142fad51c3ca1abbe06f9d"},{"introduced":"aee1438ff2f7a8df8d7f2b825f2af9c9edbaa8ed"},{"fixed":"4d88c1a264398dab28bc91da74a0760ffe7d6859"},{"introduced":"bf8837f6f8e693298073f58133b6643b92cac438"},{"fixed":"f25d63954b2593e1cd11eafb5ca929900a9f2e66"},{"introduced":"0"},{"last_affected":"91431655808cd10acf7df4c9af702d95644cbda8"},{"introduced":"0"},{"last_affected":"41f0542c1ec16ce93b336a9f5cf6eef1aba898d0"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"6.7.5"},{"introduced":"7.0.0"},{"fixed":"7.2.3"},{"introduced":"7.3.0"},{"fixed":"7.3.6"},{"introduced":"0"},{"last_affected":"4.0"},{"introduced":"0"},{"last_affected":"8.0"}]}}],"versions":["0.1.0","0.2.0","7.2.1","v0.3.0","v0.3.1","v0.4.0","v0.4.1","v0.4.2","v1.0.1","v1.0.2","v1.0.3","v1.0.4","v1.1.0","v1.2.0","v1.3.0","v1.4.0","v1.5.0","v1.5.1","v1.5.2","v1.5.3","v1.5.4","v1.6.0","v1.6.1","v1.7.0-rc1","v1.9.0","v1.9.0-rc1","v1.9.1","v2.0.0-beta1","v2.0.0-beta3","v2.0.1","v2.0.2","v2.5.0","v2.6.0","v2.6.0-beta1","v3.0-beta2","v3.0-beta3","v3.0-beta4","v3.0-beta5","v3.0.0-beta6","v3.0.0-beta7","v3.0.1","v3.0.2","v3.1.0-beta1","v4.0.0","v4.0.0-beta1","v4.0.0-beta2","v4.4.0","v4.5.0","v4.5.0-beta1","v4.6.0-beta1","v5.,2.4","v5.0.0","v5.0.0-beta1","v5.0.0-beta2","v5.0.0-beta3","v5.0.0-beta4","v5.0.0-beta5","v6.0.0-beta1","v6.5","v6.7.0","v6.7.0-beta1","v6.7.1","v6.7.2","v6.7.3","v6.7.4","v7.2.0","v7.2.0-beta1","v7.2.0-beta2","v7.2.1","v7.2.2","v7.3.0","v7.3.1","v7.3.2","v7.3.3","v7.3.4","v7.3.5","v8.0.0","v8.0.0-beta2","v8.0.0-beta3"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"3.11"}]},{"events":[{"introduced":"0"},{"last_affected":"2.0"}]},{"events":[{"introduced":"0"},{"last_affected":"32"}]},{"events":[{"introduced":"0"},{"last_affected":"33"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-27846.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}