Headline
CVE-2010-10008: openidProvider: Fix cross-site scripting. · simplesamlphp/simplesamlphp-module-openidprovider@8365d48
** UNSUPPPORTED WHEN ASSIGNED **** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in simplesamlphp simplesamlphp-module-openidprovider up to 0.8.x. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file templates/trust.tpl.php. The manipulation of the argument StateID leads to cross site scripting. The attack can be launched remotely. Upgrading to version 0.9.0 is able to address this issue. The name of the patch is 8365d48c863cf06ccf1465cc0a161cefae29d69d. It is recommended to upgrade the affected component. The identifier VDB-218473 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
Skip to content
Sign up
Actions
Automate any workflow
Packages
Host and manage packages
Security
Find and fix vulnerabilities
Codespaces
Instant dev environments
Copilot
Write better code with AI
Code review
Manage code changes
Issues
Plan and track work
Discussions
Collaborate outside of code
* Explore
* All features
* Documentation
* GitHub Skills
* Blog
For
Enterprise
Teams
Startups
Education
By Solution
CI/CD & Automation
DevOps
DevSecOps
Case Studies
Customer Stories
Resources
GitHub Sponsors
Fund open source developers
* The ReadME Project
GitHub community articles
* Repositories
* Topics
* Trending
* Collections
Pricing
In this repository All GitHub
No suggested jump to results
In this repository All GitHub
In this organization All GitHub
In this repository All GitHub
Sign in
Sign up
This repository has been archived by the owner before Nov 9, 2022. It is now read-only.
simplesamlphp / simplesamlphp-module-openidprovider Public archive
- Notifications
- Fork 6
- Star 7
- Code
- Issues 1
- Pull requests
- Actions
- Projects
- Wiki
- Security
- Insights
More
Permalink
Browse files
openidProvider: Fix cross-site scripting.
If someone is able to perform a session fixation attack on the openidProvider host, he can then make users execute scripts in that domain.
git-svn-id: https://simplesamlphp.googlecode.com/svn/trunk@2445 44740490-163a-0410-bde0-09ae8108e29a
- Loading branch information
olavmo-sikt committed
Jul 29, 2010
1 parent d4bbc9c commit 8365d48c863cf06ccf1465cc0a161cefae29d69d
Showing 1 changed file with 1 addition and 1 deletion.
2 templates/trust.tpl.php
Show comments View file
@@ -10,7 +10,7 @@
echo(‘<p>’ . $this->t('{openidProvider:openidProvider:confirm_question}’, $params) . ‘</p>’);
?>
<form method="post" action="?">
<input type="hidden" name="StateID" value="<?php echo $this->data[‘StateID’]; ?>" />
<input type="hidden" name="StateID" value="<?php echo htmlspecialchars($this->data[‘StateID’]); ?>" />
<input type="checkbox" name="TrustRemember" value="on" id="remember" />
<label for="TrustRemember"><?php echo($this->t(‘{openidProvider:openidProvider:remember}’)); ?></label>
0 comments on commit 8365d48
Please sign in to comment.