SimpleSAMLphp 1.7.0 through 1.14.10 might allow attackers to obtain sensitive information, gain unauthorized access, or have unspecified other impacts by leveraging incorrect persistent NameID generation when an Identity Provider (IdP) is misconfigured.
References
Link | Resource |
---|---|
https://github.com/simplesamlphp/simplesamlphp/commit/90dca835158495b173808273e7df127303b8b953 | Issue Tracking Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2017/12/msg00007.html | Mailing List Third Party Advisory |
https://simplesamlphp.org/security/201612-04 | Patch Vendor Advisory |
https://www.debian.org/security/2018/dsa-4127 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2017-09-01 21:29
Updated : 2024-02-04 19:29
NVD link : CVE-2017-12873
Mitre link : CVE-2017-12873
CVE.ORG link : CVE-2017-12873
JSON object : View
Products Affected
simplesamlphp
- simplesamlphp
debian
- debian_linux
CWE
CWE-384
Session Fixation