<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Simplesamlphp — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/simplesamlphp/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 15 May 2026 18:10:59 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/simplesamlphp/feed.xml" rel="self" type="application/rss+xml"/><item><title>SimpleSAMLphp casserver FileSystemTicketStore Path Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-simplesamlphp-traversal/</link><pubDate>Fri, 15 May 2026 18:10:59 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-simplesamlphp-traversal/</guid><description>A path traversal vulnerability in SimpleSAMLphp's casserver module allows remote attackers to read and potentially delete arbitrary files outside the ticket directory by manipulating the ticket parameter in CAS validation requests, impacting confidentiality and integrity.</description><content:encoded><![CDATA[<p>A path traversal vulnerability exists within the <code>simplesamlphp-module-casserver</code> module, specifically affecting deployments that utilize the <code>FileSystemTicketStore</code>. This vulnerability, identified as CVE-2026-46491, arises from the direct concatenation of the configured ticket directory with attacker-controlled ticket identifiers received via the <code>ticket</code> or <code>pgt</code> query parameters in public CAS validation/proxy endpoints. By injecting path traversal sequences (e.g., <code>../target.serialized</code>) into these parameters, attackers can read and unserialize arbitrary files outside the designated ticket directory. Furthermore, the CAS 1.0 validation flow can lead to the deletion of attacker-specified files if the PHP process has sufficient permissions and the file contents can be unserialized into a compatible type. This issue impacts versions of <code>composer/simplesamlphp/simplesamlphp-module-casserver</code> up to and including 7.0.2.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a SimpleSAMLphp instance with the casserver module enabled and configured to use FileSystemTicketStore.</li>
<li>The attacker crafts a malicious CAS validation/proxy request containing a <code>ticket</code> or <code>pgt</code> parameter with a path traversal sequence (e.g., <code>../target.serialized</code>).</li>
<li>The SimpleSAMLphp application receives the request and concatenates the attacker-controlled <code>ticket</code> parameter with the configured ticket directory.</li>
<li>The application attempts to read the file at the constructed path using <code>getTicket()</code>. Due to the path traversal, the file accessed is outside the intended ticket directory.</li>
<li>If the file contains valid serialized PHP data, the application unserializes its content.</li>
<li>In the CAS 1.0 validation flow, the application calls <code>deleteTicket()</code> with the same attacker-controlled path.</li>
<li>If the PHP process has sufficient permissions and the unserialized content meets certain criteria (e.g., an array or null), the target file is deleted.</li>
<li>The attacker achieves unauthorized file read and potentially deletion, impacting system integrity and confidentiality.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2026-46491) allows remote attackers to bypass intended file access restrictions. Confirmed impacts include the ability to read and unserialize arbitrary files outside the designated ticket cache, potentially exposing sensitive data. Furthermore, under specific conditions within the CAS 1.0 validation flow, attackers can delete files outside the ticket cache, leading to denial-of-service or data loss scenarios. The severity of file deletion depends on the filesystem permissions of the PHP process and the content of the targeted file. This could potentially lead to destruction of CAS tickets, serialized SimpleSAMLphp runtime/cache files, or other writable files whose contents can be unserialized into a value accepted by the <code>?array</code> return type.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the <code>composer/simplesamlphp/simplesamlphp-module-casserver</code> package to a version greater than 7.0.2 to remediate CVE-2026-46491.</li>
<li>Implement input validation and sanitization on the <code>ticket</code> and <code>pgt</code> parameters to prevent path traversal attacks.</li>
<li>Deploy the Sigma rule &ldquo;Detect SimpleSAMLphp FileSystemTicketStore Path Traversal Attempt&rdquo; to identify potential exploitation attempts.</li>
<li>Review and restrict the filesystem permissions of the PHP process to minimize the impact of potential file deletion.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>file-deletion</category><category>simplesamlphp</category></item></channel></rss>