Dominic,

After reviewing, it does appear that 1.4 is vulnerable to the XSS attack
and should be patched using the same patch made here:
https://github.com/michaelryanmcneill/shibboleth/blob/1d65ad6786282d23ba1865f56e2fd19188e7c26a/shibboleth.php#L463

Please let me know if you have additional questions.

Best regards,
Michael McNeill

On Mon, Sep 11, 2017 at 6:20 AM Dominic Hargreaves <d...@earth.li> wrote:

> On Mon, Sep 11, 2017 at 03:21:08AM +0000, Craig Small wrote:
> > On Wed, 6 Sep. 2017, 07:03 Dominic Hargreaves <d...@earth.li> wrote:
> >
> > > I have just become aware of an old security issue that was fixed
> > > in upstream:
> > >
> > >
> > >
> https://github.com/michaelryanmcneill/shibboleth/commit/1d65ad6786282d23ba1865f5
> > > 6e2fd19188e7c26a
> > > <
> https://github.com/michaelryanmcneill/shibboleth/commit/1d65ad6786282d23ba1865f56e2fd19188e7c26a
> >
> > >
> > >
> > > Given that noone has noticed and reported this as an issue for a year
> > > in the Debian package, and I'm not completely sure of how easy it is
> > > to exploit, I'm not exactly sure of the correct severity or whether
> > > this warrants a DSA or just a point release update. I'm CCing
> > > the Wordpress maintainer in case they have any ideas.
> > >
> > > This bug will be fixed in unstable shortly.
> > >
> > Hi,
> >   Probably a security team question but the un-patched plugin permits a
> XSS
> > attack so it should be a DSA I think.
>
> I'm just confirming the status of the bug in 1.4 with the upstream
> maintainer prior to a fix. Also looping in the security team.
>
> Cheers,
> Dominic.
>

Reply via email to