SimpleSAMLphp 1.7.0 through 1.14.10 might allow attackers to obtain sensitive information, gain unauthorized access, or have unspecified other impacts by leveraging incorrect persistent NameID generation when an Identity Provider (IdP) is misconfigured.
References
Link | Resource |
---|---|
https://github.com/simplesamlphp/simplesamlphp/commit/90dca835158495b173808273e7df127303b8b953 | Issue Tracking Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2017/12/msg00007.html | Mailing List Third Party Advisory |
https://simplesamlphp.org/security/201612-04 | Patch Vendor Advisory |
https://www.debian.org/security/2018/dsa-4127 | Third Party Advisory |
https://github.com/simplesamlphp/simplesamlphp/commit/90dca835158495b173808273e7df127303b8b953 | Issue Tracking Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2017/12/msg00007.html | Mailing List Third Party Advisory |
https://simplesamlphp.org/security/201612-04 | Patch Vendor Advisory |
https://www.debian.org/security/2018/dsa-4127 | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:10
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/simplesamlphp/simplesamlphp/commit/90dca835158495b173808273e7df127303b8b953 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2017/12/msg00007.html - Mailing List, Third Party Advisory | |
References | () https://simplesamlphp.org/security/201612-04 - Patch, Vendor Advisory | |
References | () https://www.debian.org/security/2018/dsa-4127 - Third Party Advisory |
Information
Published : 2017-09-01 21:29
Updated : 2024-11-21 03:10
NVD link : CVE-2017-12873
Mitre link : CVE-2017-12873
CVE.ORG link : CVE-2017-12873
JSON object : View
Products Affected
debian
- debian_linux
simplesamlphp
- simplesamlphp
CWE
CWE-384
Session Fixation