Miggo Logo

GHSA-v858-922f-fj9v:
SimpleSAMLphp Link Injection vulnerability

5.4

CVSS Score
3.1

Basic Information

CVE ID
-
EPSS Score
-
Published
5/28/2024
Updated
5/28/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
simplesamlphp/simplesamlphpcomposer< 1.14.41.14.4

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper handling of user-supplied parameters ('link_href' and 'retryURL') in the scripts www/logout.php and modules/core/www/no_cookie.php. These scripts directly process HTTP request parameters and pass them to the normalization function \SimpleSAML\Utils\HTTP::normalizeURL() without validation. However, the vulnerability does not reside in a specific named function but in the procedural flow of these scripts. The lack of validation (via checkURLAllowed) in the parameter-handling logic allowed arbitrary URLs to be injected. Since the vulnerable code exists at the script level rather than within defined functions, no specific functions are identified as the root cause.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### ***k*roun* S*v*r*l s*ripts p*rt o* Simpl*S*MLp*p *ispl*y * w** p*** wit* links o*t*in** *rom t** r*qu*st p*r*m*t*rs. T*is *llows us to *n**n** us**ility, *s t** us*rs *r* pr*s*nt** wit* links t**y **n *ollow **t*r *ompl*tin* * **rt*in **tion, lik

Reasoning

T** vuln*r**ility st*ms *rom improp*r **n*lin* o* us*r-suppli** p*r*m*t*rs ('link_*r**' *n* 'r*tryURL') in t** s*ripts www/lo*out.p*p *n* mo*ul*s/*or*/www/no_*ooki*.p*p. T**s* s*ripts *ir**tly pro**ss *TTP r*qu*st p*r*m*t*rs *n* p*ss t**m to t** norm