SimpleSAMLphp 1.7.0 through 1.14.10 might allow attackers to obtain sensitive information, gain unauthorized access, or have unspecified other impacts by leveraging incorrect persistent NameID generation when an Identity Provider (IdP) is misconfigured.
References
| Link | Resource |
|---|---|
| https://simplesamlphp.org/security/201612-04 | Patch Vendor Advisory |
| https://github.com/simplesamlphp/simplesamlphp/commit/90dca835158495b173808273e7df127303b8b953 | Issue Tracking Patch Third Party Advisory |
| https://lists.debian.org/debian-lts-announce/2017/12/msg00007.html | Mailing List Third Party Advisory |
| https://www.debian.org/security/2018/dsa-4127 | Third Party Advisory |
Information
Published : 2017-09-01 21:29
Updated : 2019-10-03 00:03
NVD link : CVE-2017-12873
Mitre link : CVE-2017-12873
JSON object : View
Products Affected
simplesamlphp
- simplesamlphp
debian
- debian_linux
CWE
CWE-384
Session Fixation
