Package: simplesamlphp X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security
Hi, the following vulnerabilities were published for simplesamlphp. CVE-2017-18121[0]: | The consentAdmin module in SimpleSAMLphp through 1.14.15 is vulnerable | to a Cross-Site Scripting attack, allowing an attacker to craft links | that could execute arbitrary JavaScript code on the victim's web | browser. CVE-2017-18122[1]: | A signature-validation bypass issue was discovered in SimpleSAMLphp | through 1.14.16. A SimpleSAMLphp Service Provider using SAML 1.1 will | regard as valid any unsigned SAML response containing more than one | signed assertion, provided that the signature of at least one of the | assertions is valid. Attributes contained in all the assertions | received will be merged and the entityID of the first assertion | received will be used, allowing an attacker to impersonate any user of | any IdP given an assertion signed by the targeted IdP. If you fix the vulnerabilities please also make sure to include the CVE (Common Vulnerabilities & Exposures) ids in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2017-18121 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18121 [1] https://security-tracker.debian.org/tracker/CVE-2017-18122 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18122 Please adjust the affected versions in the BTS as needed.