CVE-2017-18122: SimpleSAMLphp Signature validation bypass
8.1
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.54852%
CWE
Published
5/14/2022
Updated
4/25/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
simplesamlphp/simplesamlphp | composer | < 1.14.17 | 1.14.17 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from a non-strict in_array()
comparison in the isNodeValidated
method. PHP's default loose comparison would return true when checking any DOM node against an array containing at least one node (due to object comparison by reference). The patch adds strict comparison (third parameter 'true'), confirming the root cause was improper node validation. This function is directly responsible for checking if assertions were properly signed during SAML processing.