
CVE-2017-18121 – Debian Security Advisory 4127-1
https://notcve.org/view.php?id=CVE-2017-18121
02 Feb 2018 — The consentAdmin module in SimpleSAMLphp through 1.14.15 is vulnerable to a Cross-Site Scripting attack, allowing an attacker to craft links that could execute arbitrary JavaScript code on the victim's web browser. El módulo consentAdmin en SimpleSAMLphp, hasta la versión 1.14.15, es vulnerable a un ataque de Cross-Site Scripting (XSS), lo que permite que un atacante manipule enlaces que podrían ejecutar código JavaScript arbitrario en el navegador web de la víctima. Several vulnerabilities have been discov... • https://lists.debian.org/debian-lts-announce/2018/02/msg00008.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2017-18122 – Debian Security Advisory 4127-1
https://notcve.org/view.php?id=CVE-2017-18122
02 Feb 2018 — A signature-validation bypass issue was discovered in SimpleSAMLphp through 1.14.16. A SimpleSAMLphp Service Provider using SAML 1.1 will regard as valid any unsigned SAML response containing more than one signed assertion, provided that the signature of at least one of the assertions is valid. Attributes contained in all the assertions received will be merged and the entityID of the first assertion received will be used, allowing an attacker to impersonate any user of any IdP given an assertion signed by t... • https://lists.debian.org/debian-lts-announce/2018/02/msg00008.html • CWE-347: Improper Verification of Cryptographic Signature •

CVE-2018-6520
https://notcve.org/view.php?id=CVE-2018-6520
02 Feb 2018 — SimpleSAMLphp before 1.15.2 allows remote attackers to bypass an open redirect protection mechanism via crafted authority data in a URL. SimpleSAMLphp en versiones anteriores a la 1.15.2 permite que los atacantes omitan un mecanismo de protección contra redirecciones abiertas mediante datos de autoridad manipulados en una URL. • https://simplesamlphp.org/security/201801-02 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVE-2018-6521 – Debian Security Advisory 4127-1
https://notcve.org/view.php?id=CVE-2018-6521
02 Feb 2018 — The sqlauth module in SimpleSAMLphp before 1.15.2 relies on the MySQL utf8 charset, which truncates queries upon encountering four-byte characters. There might be a scenario in which this allows remote attackers to bypass intended access restrictions. El módulo sqlauth en SimpleSAMLphp en versiones anteriores a la 1.15.2 confía en el charset utf8 MySQL, que trunca las consultas cuando encuentra caracteres de cuatro bytes. Puede haber un escenario en el que esto permita que los atacantes remotos omitan las r... • https://lists.debian.org/debian-lts-announce/2018/02/msg00008.html •

CVE-2017-12871
https://notcve.org/view.php?id=CVE-2017-12871
01 Sep 2017 — The aesEncrypt method in lib/SimpleSAML/Utils/Crypto.php in SimpleSAMLphp 1.14.x through 1.14.11 makes it easier for context-dependent attackers to bypass the encryption protection mechanism by leveraging use of the first 16 bytes of the secret key as the initialization vector (IV). El método aesEncrypt en lib/SimpleSAML/Utils/Crypto.php en SimpleSAMLphp 1.14.x hasta la versión 1.14.11 facilita que los atacantes dependientes del contexto omitan el mecanismo de de protección de cifrado aprovechando el uso de... • https://github.com/simplesamlphp/simplesamlphp/commit/77df6a932d46daa35e364925eb73a175010dc904 • CWE-326: Inadequate Encryption Strength •

CVE-2017-12872
https://notcve.org/view.php?id=CVE-2017-12872
01 Sep 2017 — The (1) Htpasswd authentication source in the authcrypt module and (2) SimpleSAML_Session class in SimpleSAMLphp 1.14.11 and earlier allow remote attackers to conduct timing side-channel attacks by leveraging use of the standard comparison operator to compare secret material against user input. El origen de autenticación (1) Htpasswd en el módulo authcrypt y (2) la clase SimpleSAML_Session en SimpleSAMLphp 1.14.11 y anteriores permite que atacantes remotos lleven a cabo ataques de intervalos de canal latera... • https://lists.debian.org/debian-lts-announce/2017/12/msg00007.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2017-12873 – Debian Security Advisory 4127-1
https://notcve.org/view.php?id=CVE-2017-12873
01 Sep 2017 — SimpleSAMLphp 1.7.0 through 1.14.10 might allow attackers to obtain sensitive information, gain unauthorized access, or have unspecified other impacts by leveraging incorrect persistent NameID generation when an Identity Provider (IdP) is misconfigured. SimpleSAMLphp 1.7.0 hasta la versión 1.14.10 permite que los atacantes obtengan información sensible, consigan acceso sin autorización o provoquen cualquier otro impacto sin especificar aprovechando la incorrecta generación persistente de NameID cuando no se... • https://github.com/simplesamlphp/simplesamlphp/commit/90dca835158495b173808273e7df127303b8b953 • CWE-384: Session Fixation •

CVE-2017-12868
https://notcve.org/view.php?id=CVE-2017-12868
01 Sep 2017 — The secureCompare method in lib/SimpleSAML/Utils/Crypto.php in SimpleSAMLphp 1.14.13 and earlier, when used with PHP before 5.6, allows attackers to conduct session fixation attacks or possibly bypass authentication by leveraging missing character conversions before an XOR operation. El método secureCompare en lib/SimpleSAML/Utils/Crypto.php en SimpleSAMLphp 1.14.13 y anteriores, al usarse con PHP en versiones anteriores a la 5.6, permite que los atacantes lleven a cabo ataques de fijación de sesión o que, ... • https://github.com/simplesamlphp/simplesamlphp/commit/4bc629658e7b7d17c9ac3fe0da7dc5df71f1b85e • CWE-384: Session Fixation •

CVE-2017-12869 – Debian Security Advisory 4127-1
https://notcve.org/view.php?id=CVE-2017-12869
01 Sep 2017 — The multiauth module in SimpleSAMLphp 1.14.13 and earlier allows remote attackers to bypass authentication context restrictions and use an authentication source defined in config/authsources.php via vectors related to improper validation of user input. El módulo multiauth en SimpleSAMLphp 1.14.13 y anteriores permite que atacantes remotos omitan las restricciones de contexto de autenticación y empleen un origen de autenticación definido en config/authsources.php mediante vectores relacionados en la validaci... • https://lists.debian.org/debian-lts-announce/2017/12/msg00007.html • CWE-20: Improper Input Validation •

CVE-2017-12870
https://notcve.org/view.php?id=CVE-2017-12870
01 Sep 2017 — SimpleSAMLphp 1.14.12 and earlier make it easier for man-in-the-middle attackers to obtain sensitive information by leveraging use of the aesEncrypt and aesDecrypt methods in the SimpleSAML/Utils/Crypto class to protect session identifiers in replies to non-HTTPS service providers. SimpleSAMLphp 1.14.12 y anteriores hace que sea más fácil para atacantes Man-in-the-Middle (MitM) obtener información sensible mediante el aprovechamiento de los métodos aesEncrypt y aesDecrypt en la clase SimpleSAML/Utils/Crypto... • https://simplesamlphp.org/security/201704-01 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •