Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2009.0584 -- [Win] Shibboleth Service Provider: Provide Misleading Information 18 June 2009 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Shibboleth Service Provider Publisher: The Shibboleth Team Operating System: Windows Impact: Provide Misleading Information Access: Remote/Unauthenticated Original Bulletin: http://shibboleth.internet2.edu/secadv/secadv_20090615.txt - --------------------------BEGIN INCLUDED TEXT-------------------- Shibboleth Service Provider Security Advisory [15 June 2009] Updated versions of the Shibboleth 1.3.x and 2.x Service Provider software are now available which correct a security issue. This advisory pertains ONLY to sites running the SP software in conjunction with Microsoft's Internet Information Server (IIS) web server. All IIS and Windows versions are believed to be affected, primarily in conjunction with ASP.NET applications. While classic ASP and some other development tools are believed near-term safe, all IIS deployers should review this advisory and take appropriate steps. There are no known issues affecting non-IIS deployments, including all non-Windows deployments, and Apache on Windows. This is a MAJOR security issue and deployers are urged to review the information below and upgrade their installations at the soonest possible time. Critical applications that may be vulnerable should be taken offline until the upgrade is performed. Shibboleth SP software on IIS vulnerable to header spoofing ============================================================ On IIS, Shibboleth publishes user attributes associated with sessions into HTTP request headers, based on header names defined in Attribute Acceptance Policy (1.3.x) or Attribute Mapping (2.x) files. These headers are transformed into CGI variables based on mapping rules defined by the CGI specification. A number of built-in headers are set by the SP as well. The mapping between headers and CGI variables is not exact, and there are multiple header names that can map to the same variable. IIS in particular handles underscores and hyphens in header names in an unusual and problematic way, and behaves differently with respect to ASP.NET scripts than with classic ASP and other tested languages. The code in Shibboleth that is designed to clear out the potential headers that could contain authentication and attribute information cannot handle the underscore/hyphen distinction efficiently and cannot protect against such spoofing for the affected ASP.NET environment. This means that a client could supply a spoofed header with the right name and fool an application into believing that the header was set by the Shibboleth software. All versions of Shibboleth used with IIS are vulnerable to this issue when an affected application language is used. At this time, only ASP.NET is known to be affected, but it's likely that others may be affected now or in the future. However, the specific headers affected are ONLY those containing either a hyphen or an underscore (not including the leading underscore following the HTTP prefix). For example, the built-in header "HTTP_SHIB_IDENTITY_PROVIDER" *is* vulnerable, but a mapped header name of "HTTP_GIVENNAME" would *not* be. Recommendations - --------------- Because this is a complex issue, and there are a variety of work-arounds both pre- and post-update, please refer to this wiki topic for detailed information on assessing vulnerability and the trade-offs of various approaches: https://spaces.internet2.edu/display/SHIB2/secadv_20090615 This should address most questions and provide advice on both short-term and longer-term measures, including safe coding practices. If in doubt, feel free to contact the support list, or if you require confidential advice, feel free to use the "security reporting form" at http://shibboleth.internet2.edu/shib-sec-contact.cfm As a general recommendation: Affected sites using 1.3.x should upgrade to the latest patched release, 1.3.2. Affected sites using 2.x should upgrade to the latest patched release, 2.2. Having done so, you will have a measure of protection while researching your exposure to the problem and how to address it. But this is NOT a complete fix and deployers are urged to review the topic above to fully address the issue. It is likely that the new "safeHeaderNames" option will need to be enabled (it is on by default in new installations) and that applications hosted on IIS will require changes in the header names they are accessing to completely address the problem. As only Windows sites are affected in a security sense, note that the simplest way to patch is with the post-install ZIP archives available from the official download site. Updated installers are also available. http://shibboleth.internet2.edu/downloads.html At the time of writing, RPMs and other package formats may not yet be available, since the urgency of the update is a Windows-only issue. Source tarballs will however be posted, and other official packages will follow as time permits. URL for this Security Advisory: http://shibboleth.internet2.edu/secadv/secadv_20090615.txt - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iD8DBQFKOdOJNVH5XJJInbgRAhW7AJ9lXDZFdWidr8p28JWW7ZdWkjKvHwCcDdV7 lbhm+alZPKMEzIxZ/p7M6+U= =2g26 -----END PGP SIGNATURE-----