Information Exposure Through Log Files Affecting simplesamlphp package, versions <1.18.4-1


Severity

Recommended
low

Based on Debian security rating.

Threat Intelligence

EPSS
0.05% (25th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Information Exposure Through Log Files vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIAN12-SIMPLESAMLPHP-1559341
  • published25 Jan 2020
  • disclosed24 Jan 2020

Introduced: 24 Jan 2020

CVE-2020-5225  (opens in a new tab)
CWE-532  (opens in a new tab)

How to fix?

Upgrade Debian:12 simplesamlphp to version 1.18.4-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream simplesamlphp package and not the simplesamlphp package as distributed by Debian. See How to fix? for Debian:12 relevant fixed versions and status.

Log injection in SimpleSAMLphp before version 1.18.4. The www/erroreport.php script, which receives error reports and sends them via email to the system administrator, did not properly sanitize the report identifier obtained from the request. This allows an attacker, under specific circumstances, to inject new log lines by manually crafting this report ID. When configured to use the file logging handler, SimpleSAMLphp will output all its logs by appending each log line to a given file. Since the reportID parameter received in a request sent to www/errorreport.php was not properly sanitized, it was possible to inject newline characters into it, effectively allowing a malicious user to inject new log lines with arbitrary content.

CVSS Scores

version 3.1