Errata overview
Errata ID 400
Date 2018-05-08
Source package simplesamlphp
Fixed in version 1.14.11-1+deb9u1A~4.2.0.201803051050
Description
This update addresses the following issues:
* CVE-2017-12867: The SimpleSAML_Auth_TimeLimitedToken class allows attackers
  with access to a secret token to extend its validity period by manipulating
  the prepended time offset.
* CVE-2017-12869: The multiauth module allows remote attackers to bypass
  authentication context restrictions and use an authentication source
  defined in config/authsources.php via vectors related to improper
  validation of user input.
* CVE-2017-12874: The InfoCard module allows attackers to spoof XML messages
  by leveraging an incorrect check of return values in signature validation
  utilities.
* CVE-2017-18121: The consentAdmin module is vulnerable to a Cross-Site
  Scripting attack, allowing an attacker to craft links that could execute
  arbitrary JavaScript code on the victim's web browser.
* CVE-2017-18122: A signature-validation bypass issue was discovered. A
  SimpleSAMLphp Service Provider using SAML 1.1 will regard as valid any
  unsigned SAML response containing more than one signed assertion, provided
  that the signature of at least one of the assertions is valid. Attributes
  contained in all the assertions received will be merged and the entityID of
  the first assertion received will be used, allowing an attacker to
  impersonate any user of any IdP given an assertion signed by the targeted
  IdP.
* CVE-2018-6519: The SAML2 library has a Regular Expression Denial of Service
  vulnerability for fraction-of-seconds data in a timestamp.
* CVE-2018-6521: The sqlauth module relies on the MySQL utf8 charset, which
  truncates queries upon encountering four-byte characters. There might be a
  scenario in which this allows remote attackers to bypass intended access
  restrictions.
* CVE-2018-7644: The XmlSecLibs library in SimpleSAMLphp before 1.15.3
  incorrectly verifies signatures on SAML assertions, allowing a remote
  attacker to construct a crafted SAML assertion on behalf of an Identity
  Provider that would pass as cryptographically valid, thereby allowing them
  to impersonate a user from that Identity Provider, aka a key confusion
  issue.
Additional notes
CVE ID CVE-2017-12867
CVE-2017-12869
CVE-2017-12874
CVE-2017-18121
CVE-2017-18122
CVE-2018-6519
CVE-2018-6521
CVE-2018-7644
UCS Bug number #46480