Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-pxm4-r5ph-q2m2

Опубликовано: 02 дек. 2024
Источник: github
Github: Прошло ревью
CVSS4: 6.9
CVSS3: 8.3

Описание

SimpleSAMLphp SAML2 has an XXE in parsing SAML messages

Summary

When loading an (untrusted) XML document, for example the SAMLResponse, it's possible to induce an XXE.

$options is defined as: https://github.com/simplesamlphp/saml2/blob/717c0adc4877ebd58428637e5626345e59fa0109/src/SAML2/DOMDocumentFactory.php#L41 including the DTDLoad option, which allows an attacker to read file contents from local file system OR internal network.

While there is the NONET option, an attacker can simply bypass if by using PHP filters: php://filter/convert.base64-encode/resource=http://URL OR FILE

From there an attacker can induce network connections and steal the targeted file OOB (haven't fully tested this).

RCE may be possible with the php://expect or php://phar wrappers, but this hasn't been tested.

Note: The mitigation here: https://github.com/simplesamlphp/saml2/blob/717c0adc4877ebd58428637e5626345e59fa0109/src/SAML2/DOMDocumentFactory.php#L63-L69 Comes too late, as the XML has already been loaded into a document. Mitigation:

Remove the LIBXML_DTDLOAD | LIBXML_DTDATTR options. Additionally, as a defense in depth measure, check if there is the string: <!DOCTYPE inside the XML before parsing it. (This is not a complete fix because someone may be able to exploit some parser differentials, to load a DOCTYPE, maybe through spacing like: <! DOCTYPE)

Пакеты

Наименование

simplesamlphp/saml2

composer
Затронутые версииВерсия исправления

< 4.6.14

4.6.14

Наименование

simplesamlphp/saml2-legacy

composer
Затронутые версииВерсия исправления

< 4.6.14

4.6.14

EPSS

Процентиль: 32%
0.00125
Низкий

6.9 Medium

CVSS4

8.3 High

CVSS3

Дефекты

CWE-611

Связанные уязвимости

CVSS3: 8.3
ubuntu
около 1 года назад

SimpleSAMLphp SAML2 library is a PHP library for SAML2 related functionality. When loading an (untrusted) XML document, for example the SAMLResponse, it's possible to induce an XXE. This vulnerability is fixed in 4.6.14 and 5.0.0-alpha.18.

CVSS3: 8.3
nvd
около 1 года назад

SimpleSAMLphp SAML2 library is a PHP library for SAML2 related functionality. When loading an (untrusted) XML document, for example the SAMLResponse, it's possible to induce an XXE. This vulnerability is fixed in 4.6.14 and 5.0.0-alpha.18.

CVSS3: 8.3
debian
около 1 года назад

SimpleSAMLphp SAML2 library is a PHP library for SAML2 related functio ...

EPSS

Процентиль: 32%
0.00125
Низкий

6.9 Medium

CVSS4

8.3 High

CVSS3

Дефекты

CWE-611