Open mend-for-github-com[bot] opened 6 months ago
SAML2 PHP library from SimpleSAMLphp
Library home page: https://api.github.com/repos/simplesamlphp/saml2/zipball/e9786e2e47971b9e3684391778d2c489e4725f26
Dependency Hierarchy: - :x: **simplesamlphp/saml2-v3.1.2** (Vulnerable Library)
Found in HEAD commit: 9265509e6f8f33da6589d91be95eae590b521f37
Found in base branch: master
The SAML2 library before 1.10.4, 2.x before 2.3.5, and 3.x before 3.1.1 in SimpleSAMLphp has a Regular Expression Denial of Service vulnerability for fraction-of-seconds data in a timestamp.
Publish Date: 2018-02-02
URL: CVE-2018-6519
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6519
Release Date: 2018-02-02
Fix Resolution: 1.10.4,2.3.5,3.1.1
CVE-2018-6519 - High Severity Vulnerability
Vulnerable Library - simplesamlphp/saml2-v3.1.2
SAML2 PHP library from SimpleSAMLphp
Library home page: https://api.github.com/repos/simplesamlphp/saml2/zipball/e9786e2e47971b9e3684391778d2c489e4725f26
Dependency Hierarchy: - :x: **simplesamlphp/saml2-v3.1.2** (Vulnerable Library)
Found in HEAD commit: 9265509e6f8f33da6589d91be95eae590b521f37
Found in base branch: master
Vulnerability Details
The SAML2 library before 1.10.4, 2.x before 2.3.5, and 3.x before 3.1.1 in SimpleSAMLphp has a Regular Expression Denial of Service vulnerability for fraction-of-seconds data in a timestamp.
Publish Date: 2018-02-02
URL: CVE-2018-6519
CVSS 3 Score Details (7.5)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6519
Release Date: 2018-02-02
Fix Resolution: 1.10.4,2.3.5,3.1.1