{"id":"CVE-2018-6521","details":"The sqlauth module in SimpleSAMLphp before 1.15.2 relies on the MySQL utf8 charset, which truncates queries upon encountering four-byte characters. There might be a scenario in which this allows remote attackers to bypass intended access restrictions.","aliases":["GHSA-qv5p-6wrc-79wg"],"modified":"2026-04-11T12:09:36.292489Z","published":"2018-02-02T01:29:00.370Z","database_specific":{"unresolved_ranges":[{"extracted_events":[{"last_affected":"9.0"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"}]},"references":[{"type":"ADVISORY","url":"https://simplesamlphp.org/security/201801-03"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4127"},{"type":"EVIDENCE","url":"https://lists.debian.org/debian-lts-announce/2018/02/msg00008.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/cesnet/proxystatistics-simplesamlphp-module","events":[{"introduced":"0"},{"last_affected":"454bbead35b50c99470cc68aa139fb9b73c22b2a"},{"last_affected":"e28d4acff4dd8f1aa8d07dfe86a5f02f9db764f4"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"last_affected":"7.0"},{"last_affected":"8.0"}],"source":"CPE_FIELD","cpe":["cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"]}}],"versions":["v4.3.0","v5.0.0","v6.0.0","v7.0.0","v7.0.1","v7.0.2","v7.1.0","v7.1.1","v8.0.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-6521.json"}},{"ranges":[{"type":"GIT","repo":"https://github.com/simplesamlphp/simplesamlphp","events":[{"introduced":"0"},{"fixed":"d6d8df7297778317fbf07edc8d882ceb283715f0"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"fixed":"1.15.2"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:simplesamlphp:simplesamlphp:*:*:*:*:*:*:*:*"}}],"versions":["v1.12.0","v1.15.0","v1.15.0-rc1","v1.15.0-rc2","v1.15.0-rc3","v1.15.1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-6521.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}