{"id":"CVE-2017-12872","details":"The (1) Htpasswd authentication source in the authcrypt module and (2) SimpleSAML_Session class in SimpleSAMLphp 1.14.11 and earlier allow remote attackers to conduct timing side-channel attacks by leveraging use of the standard comparison operator to compare secret material against user input.","aliases":["GHSA-v882-949x-6v28"],"modified":"2026-04-11T16:51:56.294555Z","published":"2017-09-01T21:29:00.563Z","references":[{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2017/12/msg00007.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/06/msg00017.html"},{"type":"FIX","url":"https://simplesamlphp.org/security/201703-01"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/cesnet/proxystatistics-simplesamlphp-module","events":[{"introduced":"0"},{"last_affected":"454bbead35b50c99470cc68aa139fb9b73c22b2a"},{"last_affected":"e28d4acff4dd8f1aa8d07dfe86a5f02f9db764f4"}],"database_specific":{"source":"CPE_FIELD","cpe":["cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"],"extracted_events":[{"introduced":"0"},{"last_affected":"7.0"},{"last_affected":"8.0"}]}}],"versions":["v4.3.0","v5.0.0","v6.0.0","v7.0.0","v7.0.1","v7.0.2","v7.1.0","v7.1.1","v8.0.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-12872.json"}},{"ranges":[{"type":"GIT","repo":"https://github.com/simplesamlphp/simplesamlphp","events":[{"introduced":"0"},{"last_affected":"b96dcc500caae73954d4f01189e0209afc6086be"}],"database_specific":{"source":"CPE_FIELD","cpe":"cpe:2.3:a:simplesamlphp:simplesamlphp:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"0"},{"last_affected":"1.14.11"}]}}],"versions":["v1.12.0","v1.14.0","v1.14.0-rc1","v1.14.1","v1.14.10","v1.14.11","v1.14.2","v1.14.3","v1.14.4","v1.14.5","v1.14.6","v1.14.7","v1.14.8","v1.14.9"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-12872.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}