[GHSA-r353-4845-pr5p] simplesamlphp/xml-security: Missing AES-GCM Authentication Tag Validation on Encrypted Nodes Allows for Unauthorized Decryption#7162
Conversation
|
Hi there @tvdijen! A community member has suggested an improvement to your security advisory. If approved, this change will affect the global advisory listed at github.com/advisories. It will not affect the version listed in your project repository. This change will be reviewed by our Security Curation Team. If you have thoughts or feedback, please share them in a comment here! If this PR has already been closed, you can start a new community contribution for this advisory |
|
#!/bin/bash ====================================================================🛡️ SECURITY AUTO-FIX SCRIPT 🛡️====================================================================Created by: asrar-mared (المحارب الرقمي)Email: nike49424@gmail.com | nike49424@proton.meDate: 2026-01-22Purpose: إصلاح احترافي للثغرات الأمنية====================================================================الألوان للواجهةRED='\033[0;31m' الرموزSHIELD="🛡️" متغيرات العدادTOTAL_FIXED=0 ====================================================================BANNER====================================================================clear echo -e "${CYAN}${BOLD}" ====================================================================FUNCTIONS====================================================================دالة الطباعة مع تأثيرprint_status() { دالة الانتظار مع Animationloading_animation() { } دالة تنفيذ الأوامر مع معالجة الأخطاءexecute_command() { } ====================================================================PRE-FLIGHT CHECKS====================================================================echo -e "${YELLOW}${BOLD}${TARGET} المرحلة 1: فحص النظام${NC}\n" print_status "$SHIELD" "$BLUE" "فحص وجود Node.js..." print_status "$SHIELD" "$BLUE" "فحص وجود npm..." print_status "$SHIELD" "$BLUE" "فحص ملف package.json..." echo "" ====================================================================BACKUP====================================================================echo -e "${YELLOW}${BOLD}${TARGET} المرحلة 2: النسخ الاحتياطي${NC}\n" BACKUP_DIR="security-backup-$(date +%Y%m%d_%H%M%S)" print_status "$LOCK" "$BLUE" "إنشاء نسخة احتياطية..." echo "" ====================================================================PHASE 1: AUTO FIX====================================================================echo -e "${YELLOW}${BOLD}${FIRE} المرحلة 3: الإصلاح التلقائي${NC}\n" print_status "$ROCKET" "$CYAN" "تشغيل npm audit fix..." echo "" ====================================================================PHASE 2: UPDATE CRITICAL PACKAGES====================================================================echo -e "${YELLOW}${BOLD}${FIRE} المرحلة 4: تحديث الحزم الحرجة${NC}\n" Critical updatesCRITICAL_PACKAGES=( print_status "$SWORD" "$PURPLE" "تحديث ${#CRITICAL_PACKAGES[@]} حزمة حرجة..." echo "" ====================================================================PHASE 3: REPLACE DEPRECATED PACKAGES====================================================================echo -e "${YELLOW}${BOLD}${FIRE} المرحلة 5: استبدال الحزم المهجورة${NC}\n" print_status "$WARNING" "$YELLOW" "فحص وجود 'request'..." echo "" ====================================================================PHASE 4: UPDATE OCTOKIT====================================================================echo -e "${YELLOW}${BOLD}${FIRE} المرحلة 6: تحديث @octokit${NC}\n" OCTOKIT_PACKAGES=( print_status "$SHIELD" "$BLUE" "تحديث حزم Octokit..." echo "" ====================================================================PHASE 5: UPDATE DEV DEPENDENCIES====================================================================echo -e "${YELLOW}${BOLD}${FIRE} المرحلة 7: تحديث أدوات التطوير${NC}\n" DEV_PACKAGES=( print_status "$ROCKET" "$CYAN" "تحديث أدوات التطوير..." echo "" ====================================================================PHASE 6: FORCE FIX REMAINING====================================================================echo -e "${YELLOW}${BOLD}${FIRE} المرحلة 8: الإصلاح القسري${NC}\n" print_status "$WARNING" "$YELLOW" "تطبيق الإصلاح القسري للثغرات المتبقية..." echo "" ====================================================================PHASE 7: CLEANUP & REINSTALL====================================================================echo -e "${YELLOW}${BOLD}${TARGET} المرحلة 9: التنظيف وإعادة التثبيت${NC}\n" print_status "$SHIELD" "$BLUE" "تنظيف ذاكرة التخزين المؤقت..." print_status "$ROCKET" "$CYAN" "إعادة تثبيت التبعيات..." echo "" ====================================================================FINAL AUDIT====================================================================echo -e "${YELLOW}${BOLD}${TARGET} المرحلة 10: الفحص النهائي${NC}\n" print_status "$SHIELD" "$BLUE" "إجراء فحص أمني نهائي..." AUDIT_OUTPUT=$(npm audit --json 2>/dev/null) if [ -z "$VULNERABILITIES" ]; then echo "" ====================================================================RESULTS REPORT====================================================================END_TIME=$(date +%s) clear echo -e "${CYAN}${BOLD}╔════════════════════════════════════════════════════════════════╗${NC}" echo -e "${WHITE}${BOLD}📊 الإحصائيات:${NC}" echo -e "${WHITE}${BOLD}📁 الملفات المحدثة:${NC}" echo -e "${WHITE}${BOLD}💾 النسخة الاحتياطية:${NC}" if [ "$VULNERABILITIES" -eq 0 ]; then echo -e "${PURPLE}${BOLD}╔════════════════════════════════════════════════════════════════╗${NC}" echo -e "${CYAN}📧 للتواصل:${NC}" echo -e "${RED}${BOLD}" ====================================================================SAVE REPORT====================================================================REPORT_FILE="security-fix-report-$(date +%Y%m%d_%H%M%S).txt" print_status "$CHECK" "$GREEN" "تم حفظ التقرير في: $REPORT_FILE" echo -e "\n${GREEN}${BOLD}${ROCKET} للمراجعة النهائية، قم بتشغيل:${NC}" exit 0 |
Updates
Comments
The affected versions were wrong by mistake. We've also released a patch for the v1.13 branch.
Composer now refuses to install because it thinks v1.13.9 is vulnerable: