Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-ww7x-3gxh-qm6r

Опубликовано: 28 нояб. 2023
Источник: github
Github: Прошло ревью
CVSS3: 7.5

Описание

Validation of SignedInfo

Validation of an XML Signature requires verification that the hash value of the related XML-document (after any optional transformations and/or normalizations) matches a specific DigestValue-value, but also that the cryptografic signature on the SignedInfo-tree (the one that contains the DigestValue) verifies and matches a trusted public key.

Within the simpleSAMLphp/xml-security library (https://github.com/simplesamlphp/xml-security), the hash is being validated using SignedElementTrait::validateReference, and the signature is being verified in SignedElementTrait::verifyInternal

https://github.com/simplesamlphp/xml-security/blob/master/src/XML/SignedElementTrait.php:

afbeelding

What stands out is that the signature is being calculated over the canonical version of the SignedInfo-tree. The validateReference method, however, uses the original non-canonicalized version of SignedInfo.

Impact

If an attacker somehow (i.e. by exploiting a bug in PHP's canonicalization function) manages to manipulate the canonicalized version's DigestValue, it would be potentially be possible to forge the signature. No possibilities to exploit this were found during the investigation.

Пакеты

Наименование

simplesamlphp/xml-security

composer
Затронутые версииВерсия исправления

= 1.6.11

1.6.12

Наименование

simplesamlphp/saml2

composer
Затронутые версииВерсия исправления

= 5.0.0-alpha.12

5.0.0-alpha.13

EPSS

Процентиль: 42%
0.00205
Низкий

7.5 High

CVSS3

Дефекты

CWE-345

Связанные уязвимости

CVSS3: 6.8
redhat
около 2 лет назад

xml-security is a library that implements XML signatures and encryption. Validation of an XML signature requires verification that the hash value of the related XML-document matches a specific DigestValue-value, but also that the cryptographic signature on the SignedInfo-tree (the one that contains the DigestValue) verifies and matches a trusted public key. If an attacker somehow (i.e. by exploiting a bug in PHP's canonicalization function) manages to manipulate the canonicalized version's DigestValue, it would be possible to forge the signature. This issue has been patched in version 1.6.12 and 5.0.0-alpha.13.

CVSS3: 6.8
nvd
около 2 лет назад

xml-security is a library that implements XML signatures and encryption. Validation of an XML signature requires verification that the hash value of the related XML-document matches a specific DigestValue-value, but also that the cryptographic signature on the SignedInfo-tree (the one that contains the DigestValue) verifies and matches a trusted public key. If an attacker somehow (i.e. by exploiting a bug in PHP's canonicalization function) manages to manipulate the canonicalized version's DigestValue, it would be possible to forge the signature. This issue has been patched in version 1.6.12 and 5.0.0-alpha.13.

CVSS3: 6.8
fstec
около 2 лет назад

Уязвимость программной реализации протокола SAML simplesamlphp/saml2 и программы безопасной обработки XML-документов simplesamlphp/xml-security, связанная с недостаточной проверкой подлинности данных, позволяющая нарушителю создать ложное SAML-сообщение

EPSS

Процентиль: 42%
0.00205
Низкий

7.5 High

CVSS3

Дефекты

CWE-345