GHSA-v858-922f-fj9v:
SimpleSAMLphp Link Injection vulnerability
5.4
CVSS Score
3.1
Basic Information
CVE ID
-
GHSA ID
EPSS Score
-
CWE
Published
5/28/2024
Updated
5/28/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
simplesamlphp/simplesamlphp | composer | < 1.14.4 | 1.14.4 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper handling of user-supplied parameters ('link_href' and 'retryURL') in the scripts www/logout.php and modules/core/www/no_cookie.php. These scripts directly process HTTP request parameters and pass them to the normalization function \SimpleSAML\Utils\HTTP::normalizeURL() without validation. However, the vulnerability does not reside in a specific named function but in the procedural flow of these scripts. The lack of validation (via checkURLAllowed) in the parameter-handling logic allowed arbitrary URLs to be injected. Since the vulnerable code exists at the script level rather than within defined functions, no specific functions are identified as the root cause.