Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2009.1480 Shibboleth 1.3.x and 2.x Identity Provider and Service Provider software updated 5 November 2009 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Shibboleth 1.3.x Shibboleth 2.x Shibboleth Identity Provider Shibboleth Service Provider Publisher: The Shibboleth Team Operating System: Windows UNIX variants (UNIX, Linux, OSX) Impact/Access: Cross-site Scripting -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2009-3300 Original Bulletin: http://shibboleth.internet2.edu/secadv/secadv_20091104.txt - --------------------------BEGIN INCLUDED TEXT-------------------- Shibboleth Security Advisory [4 November 2009] Updated versions of the Shibboleth 1.3.x and 2.x Identity Provider and Service Provider software are available which correct a security issue. This general issue affects BOTH the Identity and Service Provider components, so a single advisory is being issued for both. Shibboleth software improperly handles malformed URLs ======================================================================= The Shibboleth software includes code to perform arbitrary redirections and generates forms containing arbitrary destinations in certain cases. The URLs used were not properly checked for certain kinds of cross-site scripting (XSS) attacks and are vulnerable to script injection and some related vulnerabilities. Identity Provider Vulnerability - ------------------------------- Both the 1.3.x and 2.x Identity Provider software versions are vulnerable to script injection when supporting so-called "anonymous" relying parties. IdP 1.3.x has anonymous relying party support enabled by default. To disable it add the attribute 'allowAnonymousProviders="false"' to the <IdPConfig> element within the idp.xml configuration file. IdP 2.x has anonymous relying party support disabled by default. It has been enabled if there are <ProfileConfiguration> elements within the <AnonymousRelyingParty> element in the relying-party.xml configuration file. Remove the <ProfileConfiguration> elements to disable it again. In normal use, the software enforces restrictions on the URLs it will use based on the SAML metadata it's given. If the software is configured to respond to requests without corresponding metadata, as described above, or if the source of metadata is insufficiently secure, it is vulnerable. Even if your configuration is not vulnerable, we do recommend that you perform the appropriate upgrade. Identity Provider Recommendations - --------------------------------- Sites using 1.3.x should upgrade to the latest released version, 1.3.4, in the usual fashion. Sites using 2.x should upgrade to the latest released version, 2.1.5, per the normal upgrade process: https://spaces.internet2.edu/display/SHIB2/IdP2Upgrade Service Provider Vulnerability - ------------------------------ Both the 1.3.x and 2.x Service Provider software versions are vulnerable to both script injection and some lower-level attacks when configured in typical fashion because of the number of arbitrary redirects supported throughout the feature set. It is unlikely that a typical deployment could be effectively configured to resist all possible sources of attack. Service Provider Recommendations - -------------------------------- Sites using 1.3.x should upgrade to the latest released version, 1.3.5, in the usual fashion. Sites using 2.x should upgrade to the latest released version, 2.3, in the usual fashion. This requires upgrades to the dependent OpenSAML and XMLTooling libraries to versions 2.3 and 1.3 respectively. Sites using the Windows version of the software can obtain this fix from the updated and signed postinstall.zip packages available on the download site for the 2.3 and 1.3.5 SPs. Sites using non-Windows versions can update by building and installing the updated packages from source, or by RPM, Macport, or other applicable mechanism. For those using platforms unsupported by the project team directly, refer to your vendor or package source directly for information on obtaining the fixed version. Credits - ------- Thanks to Matt Elder for reporting this issue. URL for this Security Advisory: http://shibboleth.internet2.edu/secadv/secadv_20091104.txt The Service Provider portion of this advisory has been assigned CVE-2009-3300 by the National Vulnerability Database. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-3300 - -- SWITCH Serving Swiss Universities - -------------------------- Chad La Joie, Software Engineer, Net Services Werdstrasse 2, P.O. Box, 8021 Zürich, Switzerland phone +41 44 268 15 75, fax +41 44 268 15 68 chad.lajoie@switch.ch, http://www.switch.ch - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iD8DBQFK8hp7NVH5XJJInbgRAhfAAKCGIO6/8E1g+7BmMEB2iKK54/kHGgCdHzvZ bu0YrwZGFD5F1gwubr6jAkI= =nyQZ -----END PGP SIGNATURE-----