CVE-2011-4625: simpleSAMLphp incorrectly handles XML encryption
7.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.50523%
CWE
Published
4/22/2022
Updated
1/12/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
simplesamlphp/simplesamlphp | composer | < 1.8.1 | 1.8.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability (CWE-755) stems from improper error handling during XML encryption operations. The decryption functions likely:
- Leaked timing/padding information through error responses (Crypto::aesDecrypt)
- Failed to securely handle decryption exceptions (SAML2\Utils::decryptElement)
- Didn't properly validate encryption context during assertion processing (Message::processAssertion) These would allow:
- Decryption oracle attacks via error message analysis
- Key oracle attacks through repeated malformed requests
- Message forgery by exploiting weak encryption validation While exact pre-patch code isn't available, the vulnerability pattern matches these critical encryption handling functions in the SAML flow.