CWE
384
Advisory Published
CVE Published
Updated

CVE-2017-12873

First published: Mon Dec 12 2016(Updated: )

### Background When a SimpleSAMLphp Identity Provider is misconfigured, a bug in the software when trying to build a persistent `NameID` to univocally identify the authenticating subject could cause different users to get the same identifier generated, depending on the attributes available for them right after authentication. Please note that even though this is possible thanks to a bug, **an IdP must be misconfigured** to release persistent `NameID`s even if it is not properly configured to generate them based on the specifics of the deployment. ### Description Persistent `NameID`s will typically be sent as part of the `Subject` element of a SAML assertion, or as the contents of the `eduPersonTargetedID` attribute. Here is an example of such a `NameID`: <NameID Format=“urn:oasis:names:tc:SAML:2.0:nameid-format:persistent“> zbonsm0Yn9Gnw14uQEEPr6AO7d+IvxwCQN3t+o24jYs= </NameID> Some service providers will use this information to identify a user across sessions because a persistent `NameID` will never change for a given user. This could lead to different users accessing the same account in those service providers. In order to be affected by this issue, the following circumstances must concur: - SimpleSAMLphp acts as an identity provider. - The service provider asking for authentication requests a persistent `NameID`. - No `saml:PersistentNameID` authentication processing filter is configured (neither for the whole IdP, nor for a given SP). - No `simplesaml.nameidattribute` configuration option is set (neither for the whole IdP, nor for a given SP). - One of the following alternatives: - No `userid.attribute` configuration option is set **and** the users don't have an `eduPersonPrincipalName` attribute in the users backend, **or** - the `userid.attribute` configuration option is set to an empty or missing attribute. If all these requirements are met, the `SimpleSAML_Auth_ProcessingChain` class will try to keep a unique user identifier in the state array (`addUserID()` method). Bear in mind that this code is executed **before** all the authentication processing filters configured, meaning that only those attributes retrieved for the user during **initial authentication** will be available. If no `userid.attribute` configuration option is set, the default `eduPersonPrincipalName` will then be used. However, since it is missing, no identifier will be kept. Alternatively, if `userid.attribute` is set to a missing or empty attribute, the `addUserID()` method will abort trying to register an identifier. After executing all authentication processing filters, SimpleSAMLphp will build a SAML assertion. If the service provider requests persistent `NameID`s, SimpleSAMLphp will attempt to generate one given that none is already available (because the `saml:PersistentNameID` filter was not used). At this point, the code will look for the `simplesaml.nameidattribute` configuration option in either the local IdP metadata or in the remote SP metadata. If none of them are configured, it will default to the unique user identifier previously registered by `SimpleSAML_Auth_ProcessingChain`. If no identifier was kept there, the code will log an error message: Unable to generate NameID. Check the userid.attribute option. However, instead of aborting the `NameID` generation at that point, it will go on and use a value missing from the state array as the source for the computation, meaning the `null` type will be used. Hence, all users connecting to a given service provider will get the same `NameID` generated, because all the input parameters will be the same: - The SP's entity identifier. - The IdP's entity identifier. - The `null` value. - The common secret salt from the main configuration. ### Affected versions All SimpleSAMLphp versions between 1.7.0 and 1.14.10, inclusive. ### Impact Those identity providers affected by this bug and misconfigured as previously described could be issuing SAML assertions with common `NameID`s for all or a subset of their users. If a service provider uses those `NameID`s to identify the users of the affected IdP, all the users will be associated with the same user account at the service provider, causing all sorts of potential security issues like information disclosure or unauthorized access. While we can consider this unlikely to happen, some cases have been already observed. In particular, some identity providers using default configurations and consuming metadata automatically (i.e. using the _metarefresh_ module) while using a user backend like _Active Directory_ that does not populate `eduPersonPrincipalName` are particularly sensitive to this issue. ### Resolution Upgrade to the latest version. Configure a `saml:PersistentNameID` authentication processing filter according to your needs. Remember to check that **the attribute used as the source** for the `NameID` **is present at the moment the `saml:PersistentNameID` filter is executed**. The attribute used must be **unique** per user, and **must not change** over time.

Credit: cve@mitre.org cve@mitre.org

Affected SoftwareAffected VersionHow to fix
composer/simplesamlphp/simplesamlphp>=1.7.0<1.14.11
debian/simplesamlphp
1.16.3-1+deb10u2
1.16.3-1+deb10u1
1.19.0-1
1.19.7-1
composer/simplesamlphp/simplesamlphp>=1.7.0<1.14.11
1.14.11
SimpleSAMLphp>=1.7.0<=1.14.10
Debian GNU/Linux=7.0
Debian GNU/Linux=8.0
Debian GNU/Linux=9.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2017-12873?

    CVE-2017-12873 is rated as a medium severity vulnerability due to the misconfiguration issue that may lead to the identifier clash among different users.

  • How do I fix CVE-2017-12873?

    To fix CVE-2017-12873, ensure you upgrade SimpleSAMLphp to version 1.14.11 or later, or use version 1.16.3-1+deb10u1 or higher for Debian installations.

  • What systems are affected by CVE-2017-12873?

    CVE-2017-12873 affects SimpleSAMLphp versions between 1.7.0 and 1.14.10 and various Debian Linux distributions that include SimpleSAMLphp.

  • What does CVE-2017-12873 vulnerability expose?

    CVE-2017-12873 exposes users to the risk of having the same persistent NameID across different user accounts, which compromises user uniqueness.

  • Is there a workaround for CVE-2017-12873 while I prepare to upgrade?

    As a temporary workaround for CVE-2017-12873, review your SimpleSAMLphp configuration settings to ensure proper user attribute management, though upgrading is the best solution.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203