Miggo Logo

CVE-2018-1000165: LightSAML Incorrect Access Control vulnerability

7.5

CVSS Score
3.0

Basic Information

EPSS Score
0.42313%
Published
5/13/2022
Updated
4/23/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
lightsaml/lightsamlcomposer< 1.3.51.3.5

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The GitHub patch adds critical algorithm validation logic to castKeyIfNecessary, indicating this was the missing security control. The vulnerability description explicitly mentions signature validation flaws in XmlDSig readers, and the CWE-732 (Incorrect Permission Assignment) maps to the lack of proper algorithm restrictions. The pre-patch version would accept any algorithm type without validation, enabling potential impersonation via crafted signatures.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

Li**tS*ML v*rsion prior to *.*.* *ont*ins * In*orr**t ****ss *ontrol vuln*r**ility in si*n*tur* v*li**tion in r****rs in `sr*/Li**tS*ml/Mo**l/Xml*Si*/` t**t **n r*sult in imp*rson*tion o* *ny us*r *rom I**ntity Provi**r. T*is vuln*r**ility *pp**rs to

Reasoning

T** *it*u* p*t** ***s *riti**l *l*orit*m v*li**tion lo*i* to **stK*yI*N***ss*ry, in*i**tin* t*is w*s t** missin* s**urity *ontrol. T** vuln*r**ility **s*ription *xpli*itly m*ntions si*n*tur* v*li**tion *l*ws in Xml*Si* r****rs, *n* t** *W*-*** (In*or