In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Cross-site Scripting (XSS) vulnerabilities in an interactive lesson.
Start learningUpgrade simplesamlphp/simplesamlphp
to version 1.17.3 or higher.
simplesamlphp/simplesamlphp is a PHP implementation of a SAML 2.0 service provider and identity provider, also compatible with Shibboleth 1.3 and 2.0.
Affected versions of this package are vulnerable to Cross-site Scripting (XSS).
When sending a SAML
message to another entity, SimpleSAMLphp will use the URL of the appropriate endpoint to redirect the user's browser to it, or craft a form that will be automatically posted to it. The URL that's target of the message is fetched from the stored metadata for the given entity, and that metadata is trusted as correct.
However, if that metadata has been altered by a malicious party (either an attacker or a rogue administrator) to substitute the URLs of the endpoints with javascript code, SimpleSAMLphp uses them without any validation.