First published: Wed Apr 26 2017(Updated: )
SimpleSAMLphp 1.14.12 and earlier make it easier for man-in-the-middle attackers to obtain sensitive information by leveraging use of the aesEncrypt and aesDecrypt methods in the SimpleSAML/Utils/Crypto class to protect session identifiers in replies to non-HTTPS service providers.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/simplesamlphp/simplesamlphp | <1.14.13 | |
composer/simplesamlphp/simplesamlphp | <1.14.13 | 1.14.13 |
SimpleSAMLphp | <=1.14.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-12870 is classified as a medium severity vulnerability due to its potential for man-in-the-middle attacks.
To fix CVE-2017-12870, upgrade SimpleSAMLphp to version 1.14.13 or later.
CVE-2017-12870 affects SimpleSAMLphp versions 1.14.12 and earlier.
CVE-2017-12870 exposes users to man-in-the-middle attacks that can compromise session identifiers.
CVE-2017-12870 primarily affects non-HTTPS service providers, making it easier for attackers to intercept communications.