SimpleSAMLphp vulnerable to XXE in parsing SAML messages
High severity
GitHub Reviewed
Published
Dec 2, 2024
in
simplesamlphp/simplesamlphp
•
Updated Dec 4, 2024
Withdrawn
This advisory was withdrawn on Dec 4, 2024
Package
Affected versions
>= 2.3.0, < 2.3.4
>= 2.2.0, < 2.2.4
>= 2.1.0, < 2.1.7
< 2.0.15
Patched versions
2.3.4
2.2.4
2.1.7
2.0.15
Description
Published to the GitHub Advisory Database
Dec 2, 2024
Reviewed
Dec 2, 2024
Withdrawn
Dec 4, 2024
Last updated
Dec 4, 2024
Withdrawn Advisory
This advisory has been withdrawn because the vulnerability affects users of the SimpleSAMLphp tarball, not the SimpleSAMLphp Composer package. The underlying information about CVE-2024-52596 is still valid.
Original Description
Summary
When loading an (untrusted) XML document, for example the SAMLResponse, it's possible to induce an XXE.
Mitigation:
Remove the
LIBXML_DTDLOAD | LIBXML_DTDATTR
options from$options
is in: https://github.com/simplesamlphp/saml2/blob/717c0adc4877ebd58428637e5626345e59fa0109/src/SAML2/DOMDocumentFactory.php#L41Background / details
To be published on Dec 8th
References