opensaml2: CVE-2017-16853: Dynamic MetadataProvider fails to install security filters (CPPOST-105)

Related Vulnerabilities: CVE-2017-16853   CVE-2017-16852  

Debian Bug report logs - #881856
opensaml2: CVE-2017-16853: Dynamic MetadataProvider fails to install security filters (CPPOST-105)

version graph

Reported by: Salvatore Bonaccorso <carnil@debian.org>

Date: Wed, 15 Nov 2017 20:09:04 UTC

Severity: grave

Tags: patch, security, upstream

Found in version opensaml2/2.5.3-2

Fixed in versions opensaml2/2.6.1-1, opensaml2/2.6.0-4+deb9u1, opensaml2/2.5.3-2+deb8u2

Done: wferi@niif.hu (Ferenc Wágner)

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Debian Shib Team <pkg-shibboleth-devel@lists.alioth.debian.org>:
Bug#881856; Package src:opensaml2. (Wed, 15 Nov 2017 20:09:07 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Debian Shib Team <pkg-shibboleth-devel@lists.alioth.debian.org>. (Wed, 15 Nov 2017 20:09:07 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: opensaml2: Dynamic MetadataProvider fails to install security filters (CPPOST-105)
Date: Wed, 15 Nov 2017 21:06:09 +0100
Source: opensaml2
Version: 2.5.3-2
Severity: grave
Tags: patch security upstream
Justification: user security hole
Control: clone -1 -2
Control: reassign -2 shibboleth-sp2 2.5.3+dfsg-2
Control: retitle -2 shibboleth-sp2: Dynamic MetadataProvider fails to install security filters (SSCPP-763)

Hi

As per https://shibboleth.net/community/advisories/secadv_20171115.txt
an issue affecting opensaml2 and shibboleth-sp2:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Shibboleth Service Provider Security Advisory [15 November 2017]

An updated version of the Shibboleth Service Provider software
is available which corrects a critical security issue in the
"Dynamic" metadata provider plugin.

Deployers making use of the affected feature should apply the
relevant update at the soonest possible moment.

NOTE: CVEs for this issue are forthcoming from the Debian Project
and this advisory will be updated if and when they are obtained.

Dynamic MetadataProvider fails to install security filters
============================================================
The Shibboleth Service Provider software includes a MetadataProvider
plugin with the plugin type "Dynamic" to obtain metadata on demand
from a query server, in place of the more typical mode of downloading
aggregates separately containing all of the metadata to load.

All the plugin types rely on MetadataFilter plugins to perform critical
security checks such as signature verification, enforcement of validity
periods, and other checks specific to deployments.

Due to a coding error, the "Dynamic" plugin fails to configure itself
with the filters provided to it and thus omits whatever checks they are
intended to perform, which will typically leave deployments vulnerable
to active attacks involving the substitution of metadata if the network
path to the query service is compromised.

Affected Systems
==================
All versions of the Service Provider software prior to V2.6.1 contain
this vulnerability.

There are no known mitigations to prevent this attack apart from
applying this update. Deployers should take immediate steps, and
may wish to disable the use of this feature until the upgrade is done.

Service Provider Deployer Recommendations
===========================================
Upgrade to V2.6.1 or later of the Service Provider and restart the
shibd service/daemon.

Sites relying on official RPM packages or Macports can update via the
yum and port commands respectively.

For those using platforms unsupported by the project team directly,
refer to your vendor or package source directly for information on
obtaining the fixed version. If the update from your vendor lags,
you may consider building from source for your own use as an interim
step.

The patch commit that corrects this issue can be found at [1].

Additional Recommendations for Federation Operators
=====================================================
Operators of metadata query services in support of this feature may
wish to consider implementing security checks after a suitable upgrade
window has elapsed to prevent use of affected versions or follow up
with deployers. The User Agent string in requests to the service
will contain the version of the software.

Note Regarding OpenSAML Library
=================================
An identical issue exists in the DynamicMetadataProvider class in
the OpenSAML-C library in all versions prior to V2.6.1. Applications
making direct use of this library must be independently updated to
correct this vulnerability, but this fix does not correct the issue
with respect to the use of the Shibboleth SP.

The patch commit that corrects the OpenSAML issue can be found at [2].

Credits
=========
Rod Widdowson, Steading System Software LLP

[1] https://git.shibboleth.net/view/?p=cpp-sp.git;a=commit;
h=b66cceb0e992c351ad5e2c665229ede82f261b16

[2] https://git.shibboleth.net/view/?p=cpp-opensaml.git;a=commit;
h=6182b0acf2df670e75423c2ed7afe6950ef11c9d

URL for this Security Advisory:
https://shibboleth.net/community/advisories/secadv_20171115.txt

-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEE3KoVAHvtneaQzZUjN4uEVAIneWIFAloMTwMACgkQN4uEVAIn
eWKF4hAAqJxTRUQd/BxyQA4Cnq0ysA4A+Ld1+odGrBGQp4zKjmY4lK1SqbKKsPV3
7fJvFfmojZ5nWE/KtwHSoFyqAFqYLy/2MtwMUkF/lNQTQdgjVAJ0jTRSIvMZw0H+
PGfniwN+qSowwNQe6/nV9TbkSbFEfJSWcQ+VZkzchltwD4I2DQR7VTy4rlDfTj3L
WTpz7+2927pawl0ELwYF4wdDf0JTA0b7hYy9Hbm0WZyOiN+nl//zTV2ZtzlwWt+k
fNilA4BVl5OPmosp1FuPgsxCThRkHrr9SIwDeQDngSQqp8zomhDAuFLV6AZEuPXT
hVoysaQDe12bbx6680uGSIvSs35qCiuqe8em+8Dek/Abiu0NDvPlpP01vMxYQc+U
RN5emyWyFIbt4JDbYIaBz0sBYDcRNTMQrt/a5EQ1NCGx8mm5UIeDXacdd1MWb9hj
f+KfO68JHMxZuONj5RysvByi6EyOuBuoGDsXoEzzGQQtmNa8e1wQurJYDnSAp+uA
xayZKA2ea2FRpI0ON1UaZLARrn6o0Jf28FrbVO+h7e2wiX3la0oQKF5qBJ0sBYhP
5fXR/otDKeAz/3kZC/iSsDXY+ApLYurNk9AKMP4hfAfk5/xpBA7IisGk+w3RlJju
d3iu9xFlcShS+pXbf1+P5qW1QFXZYnPU3gJlzTKcNbqcOPbLS/8=
=IpAG
-----END PGP SIGNATURE-----

There is though the statement that CVEs will be assigned by the Debian
project. This cannot be done, since the fix was already in the
repository when asked and a CVE needs to be assigned via the MITRE
primary CNA.

Fixes for oldstable and stable are pending and already prepared by
Ferenc Wágner.

Regards,
Salvatore

Bug 881856 cloned as bug 881857 Request was from Salvatore Bonaccorso <carnil@debian.org> to submit@bugs.debian.org. (Wed, 15 Nov 2017 20:09:07 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org, Debian Shib Team <pkg-shibboleth-devel@lists.alioth.debian.org>:
Bug#881856; Package src:opensaml2. (Thu, 16 Nov 2017 18:21:04 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian Shib Team <pkg-shibboleth-devel@lists.alioth.debian.org>. (Thu, 16 Nov 2017 18:21:04 GMT) (full text, mbox, link).


Message #12 received at 881856@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: 881856@bugs.debian.org
Subject: Re: Bug#881856: opensaml2: Dynamic MetadataProvider fails to install security filters (CPPOST-105)
Date: Thu, 16 Nov 2017 19:18:19 +0100
Control: retitle -1 shibboleth-sp2: CVE-2017-16852: Dynamic MetadataProvider fails to install security filters (SSCPP-763)

This issue has been assigned CVE-2017-16852.

Regards,
Salvatore



Changed Bug title to 'shibboleth-sp2: CVE-2017-16852: Dynamic MetadataProvider fails to install security filters (SSCPP-763)' from 'opensaml2: Dynamic MetadataProvider fails to install security filters (CPPOST-105)'. Request was from Salvatore Bonaccorso <carnil@debian.org> to 881856-submit@bugs.debian.org. (Thu, 16 Nov 2017 18:21:04 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org, Debian Shib Team <pkg-shibboleth-devel@lists.alioth.debian.org>:
Bug#881856; Package src:opensaml2. (Thu, 16 Nov 2017 18:21:07 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian Shib Team <pkg-shibboleth-devel@lists.alioth.debian.org>. (Thu, 16 Nov 2017 18:21:07 GMT) (full text, mbox, link).


Message #19 received at 881856@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: 881856@bugs.debian.org
Subject: Re: Bug#881856: opensaml2: Dynamic MetadataProvider fails to install security filters (CPPOST-105)
Date: Thu, 16 Nov 2017 19:19:39 +0100
Control: retitle -1 opensaml2: CVE-2017-16853: Dynamic MetadataProvider fails to install security filters (CPPOST-105)

This issue has been assigned CVE-2017-16853.

Regards,
Salvatore



Changed Bug title to 'opensaml2: CVE-2017-16853: Dynamic MetadataProvider fails to install security filters (CPPOST-105)' from 'shibboleth-sp2: CVE-2017-16852: Dynamic MetadataProvider fails to install security filters (SSCPP-763)'. Request was from Salvatore Bonaccorso <carnil@debian.org> to 881856-submit@bugs.debian.org. (Thu, 16 Nov 2017 18:21:07 GMT) (full text, mbox, link).


Marked as fixed in versions opensaml2/2.5.3-2+deb8u2. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Thu, 16 Nov 2017 19:27:07 GMT) (full text, mbox, link).


Marked as fixed in versions opensaml2/2.6.0-4+deb9u1. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Thu, 16 Nov 2017 19:27:07 GMT) (full text, mbox, link).


Marked as fixed in versions opensaml2/2.6.1-1. Request was from Ferenc Wágner <wferi@debian.org> to control@bugs.debian.org. (Tue, 21 Nov 2017 08:24:06 GMT) (full text, mbox, link).


Reply sent to wferi@niif.hu (Ferenc Wágner):
You have taken responsibility. (Thu, 04 Jan 2018 14:06:07 GMT) (full text, mbox, link).


Notification sent to Salvatore Bonaccorso <carnil@debian.org>:
Bug acknowledged by developer. (Thu, 04 Jan 2018 14:06:07 GMT) (full text, mbox, link).


Message #32 received at 881856-done@bugs.debian.org (full text, mbox, reply):

From: wferi@niif.hu (Ferenc Wágner)
To: 881857-done@bugs.debian.org, 881856-done@bugs.debian.org
Subject: These have already been fixed in all relevant distributions
Date: Thu, 04 Jan 2018 15:02:40 +0100
Thus closing both.
-- 
Feri



Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Fri, 02 Feb 2018 07:31:29 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 16:19:20 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.