{"id":"CVE-2017-12872","details":"The (1) Htpasswd authentication source in the authcrypt module and (2) SimpleSAML_Session class in SimpleSAMLphp 1.14.11 and earlier allow remote attackers to conduct timing side-channel attacks by leveraging use of the standard comparison operator to compare secret material against user input.","aliases":["GHSA-v882-949x-6v28"],"modified":"2026-03-15T22:14:11.603271Z","published":"2017-09-01T21:29:00.563Z","references":[{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/06/msg00017.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2017/12/msg00007.html"},{"type":"FIX","url":"https://simplesamlphp.org/security/201703-01"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/cesnet/proxystatistics-simplesamlphp-module","events":[{"introduced":"0"},{"last_affected":"454bbead35b50c99470cc68aa139fb9b73c22b2a"},{"introduced":"0"},{"last_affected":"e28d4acff4dd8f1aa8d07dfe86a5f02f9db764f4"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"7.0"},{"introduced":"0"},{"last_affected":"8.0"}]}},{"type":"GIT","repo":"https://github.com/simplesamlphp/simplesamlphp","events":[{"introduced":"0"},{"last_affected":"b96dcc500caae73954d4f01189e0209afc6086be"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.14.11"}]}}],"versions":["v1.12.0","v1.14.0","v1.14.0-rc1","v1.14.1","v1.14.10","v1.14.11","v1.14.2","v1.14.3","v1.14.4","v1.14.5","v1.14.6","v1.14.7","v1.14.8","v1.14.9","v4.3.0","v5.0.0","v6.0.0","v7.0.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-12872.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}