CVE-2020-5226
Cross-site scripting in SimpleSAMLphp
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Cross-site scripting in SimpleSAMLphp before version 1.18.4. The www/erroreport.php script allows error reports to be submitted and sent to the system administrator. Starting with SimpleSAMLphp 1.18.0, a new SimpleSAML\Utils\EMail class was introduced to handle sending emails, implemented as a wrapper of an external dependency. This new wrapper allows us to use Twig templates in order to create the email sent with an error report. Since Twig provides automatic escaping of variables, manual escaping of the free-text field in www/errorreport.php was removed to avoid double escaping. However, for those not using the new user interface yet, an email template is hardcoded into the class itself in plain PHP. Since no escaping is provided in this template, it is then possible to inject HTML inside the template by manually crafting the contents of the free-text field.
Una vulnerabilidad de tipo cross-site scripting en SimpleSAMLphp versiones anteriores a 1.18.4. El script www/erroreport.php permite que reportes de error sean ingresados y enviados al administrador del sistema. Comenzando con SimpleSAMLphp versión 1.18.0, una nueva clase SimpleSAML\Utils\EMail fue introducida para manejar el envío de correos electrónicos, implementado como un contenedor de una dependencia externa. Este nuevo contenedor nos permite usar plantillas Twig a fin de crear el correo electrónico enviado con un reporte de error. Dado que Twig provee un escape automático de variables, el escape manual del campo free-text en el archivo www/errorreport.php fue eliminado para evitar un doble escape. Sin embargo, para aquellos que aún no usan la nueva interfaz de usuario, una plantilla de correo electrónico está embebida en la clase misma en PHP plano. Dado que ningún escape es proporcionada en esta plantilla, es posible inyectar HTML dentro de la plantilla mediante la creación manualmente del contenido del campo free-text.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-01-02 CVE Reserved
- 2020-01-24 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-04 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://github.com/simplesamlphp/simplesamlphp/security/advisories/GHSA-mj9p-v2r8-wf8w | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://simplesamlphp.org/security/202001-01 | 2020-01-30 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Simplesamlphp Search vendor "Simplesamlphp" | Simplesamlphp Search vendor "Simplesamlphp" for product "Simplesamlphp" | < 1.18.4 Search vendor "Simplesamlphp" for product "Simplesamlphp" and version " < 1.18.4" | - |
Affected
|