Show filters
32 Total Results
Displaying 11-20 of 32
Sort by:
Attacker Value
Unknown
CVE-2019-3465
Disclosure Date: November 07, 2019 (last updated November 08, 2023)
Rob Richards XmlSecLibs, all versions prior to v3.0.3, as used for example by SimpleSAMLphp, performed incorrect validation of cryptographic signatures in XML messages, allowing an authenticated attacker to impersonate others or elevate privileges by creating a crafted XML message.
0
Attacker Value
Unknown
CVE-2011-4625
Disclosure Date: November 06, 2019 (last updated November 27, 2024)
simplesamlphp before 1.6.3 (squeeze) and before 1.8.2 (sid) incorrectly handles XML encryption which could allow remote attackers to decrypt or forge messages.
0
Attacker Value
Unknown
CVE-2018-7711
Disclosure Date: March 05, 2018 (last updated November 26, 2024)
HTTPRedirect.php in the saml2 library in SimpleSAMLphp before 1.15.4 has an incorrect check of return values in the signature validation utilities, allowing an attacker to get invalid signatures accepted as valid by forcing an error during validation. This occurs because of a dependency on PHP functionality that interprets a -1 error code as a true boolean value.
0
Attacker Value
Unknown
CVE-2018-7644
Disclosure Date: March 05, 2018 (last updated November 26, 2024)
The XmlSecLibs library as used in the saml2 library in SimpleSAMLphp before 1.15.3 incorrectly verifies signatures on SAML assertions, allowing a remote attacker to construct a crafted SAML assertion on behalf of an Identity Provider that would pass as cryptographically valid, thereby allowing them to impersonate a user from that Identity Provider, aka a key confusion issue.
0
Attacker Value
Unknown
CVE-2017-18122
Disclosure Date: February 02, 2018 (last updated November 26, 2024)
A signature-validation bypass issue was discovered in SimpleSAMLphp through 1.14.16. A SimpleSAMLphp Service Provider using SAML 1.1 will regard as valid any unsigned SAML response containing more than one signed assertion, provided that the signature of at least one of the assertions is valid. Attributes contained in all the assertions received will be merged and the entityID of the first assertion received will be used, allowing an attacker to impersonate any user of any IdP given an assertion signed by the targeted IdP.
0
Attacker Value
Unknown
CVE-2017-18121
Disclosure Date: February 02, 2018 (last updated November 26, 2024)
The consentAdmin module in SimpleSAMLphp through 1.14.15 is vulnerable to a Cross-Site Scripting attack, allowing an attacker to craft links that could execute arbitrary JavaScript code on the victim's web browser.
0
Attacker Value
Unknown
CVE-2018-6519
Disclosure Date: February 02, 2018 (last updated November 26, 2024)
The SAML2 library before 1.10.4, 2.x before 2.3.5, and 3.x before 3.1.1 in SimpleSAMLphp has a Regular Expression Denial of Service vulnerability for fraction-of-seconds data in a timestamp.
0
Attacker Value
Unknown
CVE-2018-6520
Disclosure Date: February 02, 2018 (last updated November 26, 2024)
SimpleSAMLphp before 1.15.2 allows remote attackers to bypass an open redirect protection mechanism via crafted authority data in a URL.
0
Attacker Value
Unknown
CVE-2018-6521
Disclosure Date: February 02, 2018 (last updated November 26, 2024)
The sqlauth module in SimpleSAMLphp before 1.15.2 relies on the MySQL utf8 charset, which truncates queries upon encountering four-byte characters. There might be a scenario in which this allows remote attackers to bypass intended access restrictions.
0
Attacker Value
Unknown
CVE-2017-12874
Disclosure Date: September 01, 2017 (last updated November 26, 2024)
The InfoCard module 1.0 for SimpleSAMLphp allows attackers to spoof XML messages by leveraging an incorrect check of return values in signature validation utilities.
0