SimpleSAMLphp 1.7.0 through 1.14.10 might allow attackers to obtain sensitive information, gain unauthorized access, or have unspecified other impacts by leveraging incorrect persistent NameID generation when an Identity Provider (IdP) is misconfigured.
Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions.
Link | Tags |
---|---|
https://github.com/simplesamlphp/simplesamlphp/commit/90dca835158495b173808273e7df127303b8b953 | issue tracking third party advisory patch |
https://lists.debian.org/debian-lts-announce/2017/12/msg00007.html | third party advisory mailing list |
https://simplesamlphp.org/security/201612-04 | patch vendor advisory |
https://www.debian.org/security/2018/dsa-4127 | third party advisory vendor advisory |