First published: Wed Jan 31 2018(Updated: )
The sqlauth module in SimpleSAMLphp before 1.15.2 relies on the MySQL utf8 charset, which truncates queries upon encountering four-byte characters. There might be a scenario in which this allows remote attackers to bypass intended access restrictions.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/simplesamlphp/simplesamlphp | <1.15.2 | |
debian/simplesamlphp | 1.16.3-1+deb10u2 1.16.3-1+deb10u1 1.19.0-1 1.19.7-1 | |
composer/simplesamlphp/simplesamlphp | <1.15.2 | 1.15.2 |
SimpleSAMLphp | <1.15.2 | |
Debian GNU/Linux | =7.0 | |
Debian GNU/Linux | =8.0 | |
Debian GNU/Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-6521 is a vulnerability in the sqlauth module of SimpleSAMLphp before version 1.15.2 that allows remote attackers to bypass access restrictions.
The severity of CVE-2018-6521 is critical with a CVSS score of 9.8.
CVE-2018-6521 impacts SimpleSAMLphp by relying on the MySQL utf8 charset, which can truncate queries containing four-byte characters.
Remote attackers can exploit CVE-2018-6521 to bypass intended access restrictions.
To fix CVE-2018-6521, update SimpleSAMLphp to version 1.15.2 or higher.