SimpleSAMLphp 1.14.12 and earlier make it easier for man-in-the-middle attackers to obtain sensitive information by leveraging use of the aesEncrypt and aesDecrypt methods in the SimpleSAML/Utils/Crypto class to protect session identifiers in replies to non-HTTPS service providers.
References
Link | Resource |
---|---|
https://simplesamlphp.org/security/201704-01 | Patch Vendor Advisory |
https://simplesamlphp.org/security/201704-01 | Patch Vendor Advisory |
Configurations
History
21 Nov 2024, 03:10
Type | Values Removed | Values Added |
---|---|---|
References | () https://simplesamlphp.org/security/201704-01 - Patch, Vendor Advisory |
Information
Published : 2017-09-01 13:29
Updated : 2024-11-21 03:10
NVD link : CVE-2017-12870
Mitre link : CVE-2017-12870
CVE.ORG link : CVE-2017-12870
JSON object : View
Products Affected
simplesamlphp
- simplesamlphp
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor