Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-7711

Опубликовано: 05 мар. 2018
Источник: debian
EPSS Низкий

Описание

HTTPRedirect.php in the saml2 library in SimpleSAMLphp before 1.15.4 has an incorrect check of return values in the signature validation utilities, allowing an attacker to get invalid signatures accepted as valid by forcing an error during validation. This occurs because of a dependency on PHP functionality that interprets a -1 error code as a true boolean value.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
simplesamlphpfixed1.15.4-1package
simplesamlphpno-dsastretchpackage
simplesamlphpno-dsajessiepackage

Примечания

  • failure mode hard to trigger for an attacker, signing of redirect binding in many cases not that important

  • https://simplesamlphp.org/security/201803-01

  • https://github.com/simplesamlphp/saml2/commit/4f6af7f69f29df8555a18b9bb7b646906b45924d

EPSS

Процентиль: 55%
0.0032
Низкий

Связанные уязвимости

CVSS3: 8.1
ubuntu
почти 8 лет назад

HTTPRedirect.php in the saml2 library in SimpleSAMLphp before 1.15.4 has an incorrect check of return values in the signature validation utilities, allowing an attacker to get invalid signatures accepted as valid by forcing an error during validation. This occurs because of a dependency on PHP functionality that interprets a -1 error code as a true boolean value.

CVSS3: 8.1
nvd
почти 8 лет назад

HTTPRedirect.php in the saml2 library in SimpleSAMLphp before 1.15.4 has an incorrect check of return values in the signature validation utilities, allowing an attacker to get invalid signatures accepted as valid by forcing an error during validation. This occurs because of a dependency on PHP functionality that interprets a -1 error code as a true boolean value.

CVSS3: 8.1
github
больше 3 лет назад

SimpleSAMLphp saml2 incorrect signature validation

EPSS

Процентиль: 55%
0.0032
Низкий