Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-5225

Опубликовано: 24 янв. 2020
Источник: debian
EPSS Низкий

Описание

Log injection in SimpleSAMLphp before version 1.18.4. The www/erroreport.php script, which receives error reports and sends them via email to the system administrator, did not properly sanitize the report identifier obtained from the request. This allows an attacker, under specific circumstances, to inject new log lines by manually crafting this report ID. When configured to use the file logging handler, SimpleSAMLphp will output all its logs by appending each log line to a given file. Since the reportID parameter received in a request sent to www/errorreport.php was not properly sanitized, it was possible to inject newline characters into it, effectively allowing a malicious user to inject new log lines with arbitrary content.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
simplesamlphpfixed1.18.4-1package
simplesamlphpno-dsabusterpackage
simplesamlphpno-dsastretchpackage
simplesamlphpno-dsajessiepackage

Примечания

  • https://github.com/simplesamlphp/simplesamlphp/security/advisories/GHSA-6gc6-m364-85ww

  • https://simplesamlphp.org/security/202001-02

  • Fixed by: https://github.com/simplesamlphp/simplesamlphp/commit/864f0392480317a6f44b0e3c26db23ad0e21e5fb (v1.18.4)

EPSS

Процентиль: 39%
0.00173
Низкий

Связанные уязвимости

CVSS3: 4.4
ubuntu
около 6 лет назад

Log injection in SimpleSAMLphp before version 1.18.4. The www/erroreport.php script, which receives error reports and sends them via email to the system administrator, did not properly sanitize the report identifier obtained from the request. This allows an attacker, under specific circumstances, to inject new log lines by manually crafting this report ID. When configured to use the file logging handler, SimpleSAMLphp will output all its logs by appending each log line to a given file. Since the reportID parameter received in a request sent to www/errorreport.php was not properly sanitized, it was possible to inject newline characters into it, effectively allowing a malicious user to inject new log lines with arbitrary content.

CVSS3: 4.4
nvd
около 6 лет назад

Log injection in SimpleSAMLphp before version 1.18.4. The www/erroreport.php script, which receives error reports and sends them via email to the system administrator, did not properly sanitize the report identifier obtained from the request. This allows an attacker, under specific circumstances, to inject new log lines by manually crafting this report ID. When configured to use the file logging handler, SimpleSAMLphp will output all its logs by appending each log line to a given file. Since the reportID parameter received in a request sent to www/errorreport.php was not properly sanitized, it was possible to inject newline characters into it, effectively allowing a malicious user to inject new log lines with arbitrary content.

CVSS3: 4.4
github
около 6 лет назад

Log injection in SimpleSAMLphp

EPSS

Процентиль: 39%
0.00173
Низкий