Skip to content

Commit 1440a1e

Browse files
authored
Create 202412-01.md
CVE-2024-52596
1 parent 099b826 commit 1440a1e

File tree

1 file changed

+40
-0
lines changed

1 file changed

+40
-0
lines changed

security/202412-01.md

Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
---
2+
layout: default
3+
title: "SSPSA 202412-01: XXE in parsing SAML messages"
4+
---
5+
6+
<aside><div class="sidebar-warning right">
7+
<h2>Date</h2>
8+
2 December 2024
9+
<h2>Affected versions</h2>
10+
11+
<code>SimpleSAMLphp 2.3.0 - 2.3.4</code><br/>
12+
<code>SimpleSAMLphp 2.2.0 - 2.2.4</code><br/>
13+
<code>SimpleSAMLphp 2.1.0 - 2.1.7</code><br/>
14+
<code>SimpleSAMLphp 2.0.0 - 2.0.14</code><br/>
15+
16+
<code>Any older version</code><br/>
17+
<h2>Severity</h2>
18+
High - CVE 8.3
19+
</div></aside>
20+
21+
# 202412-01
22+
23+
**XXE in parsing SAML messages**
24+
25+
### Description
26+
27+
When loading an (untrusted) XML document, for example the SAMLResponse, it's possible to induce an XXE.
28+
29+
### Mitigation:
30+
31+
Remove the `LIBXML_DTDLOAD | LIBXML_DTDATTR` options from `$options` is in: https://github.com/simplesamlphp/saml2/blob/717c0adc4877ebd58428637e5626345e59fa0109/src/SAML2/DOMDocumentFactory.php#L41
32+
33+
### Background / details
34+
35+
To be published on Dec 8th
36+
37+
### Credit
38+
39+
This vulnerability was discovered and reported by ahacker1-securesaml on November 18, 2024.
40+
It is registered under CVE-2024-52596.

0 commit comments

Comments
 (0)