CVE-2018-7711
Published: 5 March 2018
HTTPRedirect.php in the saml2 library in SimpleSAMLphp before 1.15.4 has an incorrect check of return values in the signature validation utilities, allowing an attacker to get invalid signatures accepted as valid by forcing an error during validation. This occurs because of a dependency on PHP functionality that interprets a -1 error code as a true boolean value.
Priority
Status
Package | Release | Status |
---|---|---|
simplesamlphp Launchpad, Ubuntu, Debian |
artful |
Ignored
(end of life)
|
bionic |
Needed
|
|
cosmic |
Ignored
(end of life)
|
|
disco |
Not vulnerable
(1.15.4-1)
|
|
eoan |
Not vulnerable
(1.15.4-1)
|
|
focal |
Not vulnerable
(1.15.4-1)
|
|
groovy |
Not vulnerable
(1.15.4-1)
|
|
hirsute |
Not vulnerable
(1.15.4-1)
|
|
impish |
Not vulnerable
(1.15.4-1)
|
|
jammy |
Not vulnerable
(1.15.4-1)
|
|
kinetic |
Not vulnerable
(1.15.4-1)
|
|
lunar |
Not vulnerable
(1.15.4-1)
|
|
mantic |
Not vulnerable
(1.15.4-1)
|
|
trusty |
Does not exist
(trusty was needs-triage)
|
|
upstream |
Released
(1.15.4-1)
|
|
xenial |
Needed
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 8.1 |
Attack vector | Network |
Attack complexity | High |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |