SimpleSAMLphp 1.7.0 through 1.14.10 might allow attackers to obtain sensitive information, gain unauthorized access, or have unspecified other impacts by leveraging incorrect persistent NameID generation when an Identity Provider (IdP) is misconfigured.
References
Link | Resource |
---|---|
https://simplesamlphp.org/security/201612-04 | Patch Vendor Advisory |
https://github.com/simplesamlphp/simplesamlphp/commit/90dca835158495b173808273e7df127303b8b953 | Issue Tracking Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2017/12/msg00007.html | Mailing List Third Party Advisory |
https://www.debian.org/security/2018/dsa-4127 | Third Party Advisory |
Information
Published : 2017-09-01 14:29
Updated : 2019-10-02 17:03
NVD link : CVE-2017-12873
Mitre link : CVE-2017-12873
JSON object : View
CWE
CWE-384
Session Fixation
Products Affected
debian
- debian_linux
simplesamlphp
- simplesamlphp