Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-9814

Опубликовано: 17 фев. 2017
Источник: debian

Описание

The validateSignature method in the SAML2\Utils class in SimpleSAMLphp before 1.14.10 and simplesamlphp/saml2 library before 1.9.1, 1.10.x before 1.10.3, and 2.x before 2.3.3 allows remote attackers to spoof SAML responses or possibly cause a denial of service (memory consumption) by leveraging improper conversion of return values to boolean.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
simplesamlphpfixed1.14.10-1package
simplesamlphpno-dsajessiepackage

Примечания

  • https://simplesamlphp.org/security/201612-01

  • https://github.com/simplesamlphp/saml2/pull/81

  • https://github.com/simplesamlphp/saml2/commit/7008b0916426212c1cc2fc238b38ab9ebff0748c

  • only exploitable in hard to achieve conditions

  • https://www.openwall.com/lists/oss-security/2016/12/03/5

Связанные уязвимости

CVSS3: 9.1
ubuntu
почти 9 лет назад

The validateSignature method in the SAML2\Utils class in SimpleSAMLphp before 1.14.10 and simplesamlphp/saml2 library before 1.9.1, 1.10.x before 1.10.3, and 2.x before 2.3.3 allows remote attackers to spoof SAML responses or possibly cause a denial of service (memory consumption) by leveraging improper conversion of return values to boolean.

CVSS3: 9.1
nvd
почти 9 лет назад

The validateSignature method in the SAML2\Utils class in SimpleSAMLphp before 1.14.10 and simplesamlphp/saml2 library before 1.9.1, 1.10.x before 1.10.3, and 2.x before 2.3.3 allows remote attackers to spoof SAML responses or possibly cause a denial of service (memory consumption) by leveraging improper conversion of return values to boolean.

CVSS3: 9.1
github
больше 3 лет назад

SimpleSAMLphp SAML2 spoof SAML responses