Show filters
26 Total Results
Displaying 11-20 of 26
Sort by:
Attacker Value
Unknown

CVE-2017-18122

Disclosure Date: February 02, 2018 (last updated November 26, 2024)
A signature-validation bypass issue was discovered in SimpleSAMLphp through 1.14.16. A SimpleSAMLphp Service Provider using SAML 1.1 will regard as valid any unsigned SAML response containing more than one signed assertion, provided that the signature of at least one of the assertions is valid. Attributes contained in all the assertions received will be merged and the entityID of the first assertion received will be used, allowing an attacker to impersonate any user of any IdP given an assertion signed by the targeted IdP.
0
Attacker Value
Unknown

CVE-2017-18121

Disclosure Date: February 02, 2018 (last updated November 26, 2024)
The consentAdmin module in SimpleSAMLphp through 1.14.15 is vulnerable to a Cross-Site Scripting attack, allowing an attacker to craft links that could execute arbitrary JavaScript code on the victim's web browser.
0
Attacker Value
Unknown

CVE-2018-6520

Disclosure Date: February 02, 2018 (last updated November 26, 2024)
SimpleSAMLphp before 1.15.2 allows remote attackers to bypass an open redirect protection mechanism via crafted authority data in a URL.
0
Attacker Value
Unknown

CVE-2018-6521

Disclosure Date: February 02, 2018 (last updated November 26, 2024)
The sqlauth module in SimpleSAMLphp before 1.15.2 relies on the MySQL utf8 charset, which truncates queries upon encountering four-byte characters. There might be a scenario in which this allows remote attackers to bypass intended access restrictions.
0
Attacker Value
Unknown

CVE-2017-12872

Disclosure Date: September 01, 2017 (last updated November 26, 2024)
The (1) Htpasswd authentication source in the authcrypt module and (2) SimpleSAML_Session class in SimpleSAMLphp 1.14.11 and earlier allow remote attackers to conduct timing side-channel attacks by leveraging use of the standard comparison operator to compare secret material against user input.
0
Attacker Value
Unknown

CVE-2017-12871

Disclosure Date: September 01, 2017 (last updated November 26, 2024)
The aesEncrypt method in lib/SimpleSAML/Utils/Crypto.php in SimpleSAMLphp 1.14.x through 1.14.11 makes it easier for context-dependent attackers to bypass the encryption protection mechanism by leveraging use of the first 16 bytes of the secret key as the initialization vector (IV).
0
Attacker Value
Unknown

CVE-2017-12873

Disclosure Date: September 01, 2017 (last updated November 26, 2024)
SimpleSAMLphp 1.7.0 through 1.14.10 might allow attackers to obtain sensitive information, gain unauthorized access, or have unspecified other impacts by leveraging incorrect persistent NameID generation when an Identity Provider (IdP) is misconfigured.
0
Attacker Value
Unknown

CVE-2017-12869

Disclosure Date: September 01, 2017 (last updated November 26, 2024)
The multiauth module in SimpleSAMLphp 1.14.13 and earlier allows remote attackers to bypass authentication context restrictions and use an authentication source defined in config/authsources.php via vectors related to improper validation of user input.
0
Attacker Value
Unknown

CVE-2017-12870

Disclosure Date: September 01, 2017 (last updated November 26, 2024)
SimpleSAMLphp 1.14.12 and earlier make it easier for man-in-the-middle attackers to obtain sensitive information by leveraging use of the aesEncrypt and aesDecrypt methods in the SimpleSAML/Utils/Crypto class to protect session identifiers in replies to non-HTTPS service providers.
0
Attacker Value
Unknown

CVE-2017-12868

Disclosure Date: September 01, 2017 (last updated November 26, 2024)
The secureCompare method in lib/SimpleSAML/Utils/Crypto.php in SimpleSAMLphp 1.14.13 and earlier, when used with PHP before 5.6, allows attackers to conduct session fixation attacks or possibly bypass authentication by leveraging missing character conversions before an XOR operation.
0