VULNERABILITY

FreeBSD: VID-0B43FAC4-005D-11F0-A540-6CC21735F730: shibboleth-sp -- Parameter manipulation allows the forging of signed SAML messages

Try Surface Command Get a continuous 360° view of your attack surface
Back to Search

FreeBSD: VID-0B43FAC4-005D-11F0-A540-6CC21735F730: shibboleth-sp -- Parameter manipulation allows the forging of signed SAML messages

Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
03/13/2025
Created
03/18/2025
Added
03/15/2025
Modified
03/24/2025

Description

The Shibboleth Project reports:

An updated version of the OpenSAML C++ library is available

which corrects a parameter manipulation vulnerability when using

SAML bindings that rely on non-XML signatures. The Shibboleth

Service Provider is impacted by this issue, and it manifests as

a critical security issue in that context.

Parameter manipulation allows the forging of signed SAML messages

A number of vulnerabilities in the OpenSAML library used by the

Shibboleth Service Provider allowed for creative manipulation of

parameters combined with reuse of the contents of older requests

to fool the library's signature verification of non-XML based

signed messages.

Most uses of that feature involve very low or

low impact use cases without critical security implications;

however, there are two scenarios that are much more critical,

one affecting the SP and one affecting some implementers who

have implemented their own code on top of our OpenSAML library

and done so improperly.

The SP's support for the HTTP-POST-SimpleSign SAML binding for

Single Sign-On responses is its critical vulnerability, and it

is enabled by default (regardless of what one's published SAML

metadata may advertise).

The other critical case involves a mistake that

does *not* impact the Shibboleth SP, allowing SSO to occur over

the HTTP-Redirect binding contrary to the plain language of the

SAML Browser SSO profile. The SP does not support this, but

other implementers may have done so.

Prior to updating, it is possible to mitigate the POST-SimpleSign

vulnerability by editing the protocols.xml configuration file and

removing this line:

<Binding id="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST-SimpleSign"

path="/SAML2/POST-SimpleSign" />

Solution(s)

  • freebsd-upgrade-package-opensaml

insightVM

Advanced vulnerability management analytics and reporting.
Key Features
  • Lightweight Endpoint Agent
  • Live Dashboards
  • Real Risk Prioritization
  • IT-Integrated Remediation Projects
  • Cloud, Virtual, and Container Assessment
  • Integrated Threat Feeds
  • Easy-to-Use RESTful API
  • Automation-Assisted Patching
  • Automated Containment
Free InsightVM Trial View All Features

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;