You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: "SSPSA 202412-01: XXE in parsing SAML messages"
4
+
---
5
+
6
+
<aside><divclass="sidebar-warning right">
7
+
<h2>Date</h2>
8
+
2 December 2024
9
+
<h2>Affected versions</h2>
10
+
11
+
<code>SimpleSAMLphp 2.3.0 - 2.3.4</code><br/>
12
+
<code>SimpleSAMLphp 2.2.0 - 2.2.4</code><br/>
13
+
<code>SimpleSAMLphp 2.1.0 - 2.1.7</code><br/>
14
+
<code>SimpleSAMLphp 2.0.0 - 2.0.14</code><br/>
15
+
16
+
<code>Any older version</code><br/>
17
+
<h2>Severity</h2>
18
+
High - CVE 8.3
19
+
</div></aside>
20
+
21
+
# 202412-01
22
+
23
+
**XXE in parsing SAML messages**
24
+
25
+
### Description
26
+
27
+
When loading an (untrusted) XML document, for example the SAMLResponse, it's possible to induce an XXE.
28
+
29
+
### Mitigation:
30
+
31
+
Remove the `LIBXML_DTDLOAD | LIBXML_DTDATTR` options from `$options` is in: https://github.com/simplesamlphp/saml2/blob/717c0adc4877ebd58428637e5626345e59fa0109/src/SAML2/DOMDocumentFactory.php#L41
32
+
33
+
### Background / details
34
+
35
+
To be published on Dec 8th
36
+
37
+
### Credit
38
+
39
+
This vulnerability was discovered and reported by ahacker1-securesaml on November 18, 2024.
0 commit comments