Miggo Logo

GHSA-vpr3-cw3h-prw8: SimpleSAMLphp Reflected Cross-site Scripting vulnerability

6.1

CVSS Score
3.1

Basic Information

CVE ID
-
EPSS Score
-
Published
5/28/2024
Updated
5/28/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
simplesamlphp/simplesamlphpcomposer>= 1.12.0, < 1.17.31.17.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from using untrusted metadata URLs without validation in HTTP redirection and form submission flows. The commit adds URL validation via isValidURL() to these functions, confirming they previously lacked validation. The redirect() and submitPOSTData() functions directly used attacker-controlled URLs, making them the injection points. The postredirect.php script was also patched, but it is a page handler rather than a discrete function.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### ***k*roun* Simpl*S*MLp*p us*s m*t***t* to **t*rmin* *ow to int*r**t wit* ot**r S*ML *ntiti*s. T*is m*t***t* in*lu**s w**t’s **ll** *n*points, w*i** *r* URLs **lon*in* to t**t *ntity w**r* S*ML m*ss***s **n ** s*nt. T**s* URLs *r* us** *ir**tly *y

Reasoning

T** vuln*r**ility st*ms *rom usin* untrust** m*t***t* URLs wit*out `v*li**tion` in *TTP r**ir**tion *n* *orm su*mission *lows. T** *ommit ***s URL `v*li**tion` vi* `isV*li*URL()` to t**s* *un*tions, *on*irmin* t**y pr*viously l**k** `v*li**tion`. T**