VYPR
High severity7.5NVD Advisory· Published Sep 1, 2017· Updated May 13, 2026

CVE-2017-12874

CVE-2017-12874

Description

The InfoCard module 1.0 for SimpleSAMLphp allows attackers to spoof XML messages by leveraging an incorrect check of return values in signature validation utilities.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
simplesamlphp/simplesamlphp-module-infocardPackagist
< 1.0.11.0.1

Affected products

4
  • cpe:2.3:a:simplesamlphp:infocard_module:1.0:*:*:*:*:simplesamlphp:*:*
  • cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*+ 2 more
    • cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
    • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
    • cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Patches

1
63b84cc837ea

bugfix: Make sure to properly check the output of openssl_verify().

1 file changed · +1 1
  • lib/RP/Zend_InfoCard_Xml_Security.php+1 1 modified
    @@ -219,7 +219,7 @@ static public function validateXMLSignature($strXMLInput, $sts_crt=NULL){
     		$signedInfoXML = self::addNamespace($signedInfo, "http://www.w3.org/2000/09/xmldsig#");
     		SimpleSAML_Logger::debug("canonicalizo ".$signedInfoXML);
     		$canonical_signedinfo = $transformer->applyTransforms($signedInfoXML);
    -		if (openssl_verify($canonical_signedinfo,$signatureValue,$check_key)) {
    +		if (openssl_verify($canonical_signedinfo,$signatureValue,$check_key) === 1) {
     			list($reference) = $sxe->xpath("//ds:Signature/ds:SignedInfo/ds:Reference");
     			openssl_free_key($check_key);
     			return (string)$reference['URI'];
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

7

News mentions

0

No linked articles in our index yet.