DEBIAN-CVE-2024-52596

Source
https://security-tracker.debian.org/tracker/CVE-2024-52596
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2024-52596.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2024-52596
Upstream
Published
2024-12-02T17:15:12Z
Modified
2025-10-22T16:28:32.354483Z
Severity
  • 8.8 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:H/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X CVSS Calculator
Summary
[none]
Details

SimpleSAMLphp xml-common is a common classes for handling XML-structures. When loading an (untrusted) XML document, for example the SAMLResponse, it's possible to induce an XXE. This vulnerability is fixed in 1.19.0.

References

Affected packages

Debian:11 / simplesamlphp

Package

Name
simplesamlphp
Purl
pkg:deb/debian/simplesamlphp?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.19.0-1+deb11u1

Affected versions

1.*

1.19.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / simplesamlphp

Package

Name
simplesamlphp
Purl
pkg:deb/debian/simplesamlphp?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.19.7-1+deb12u1

Affected versions

1.*

1.19.7-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}