Page tree

The Shibboleth 2.x software has reached its End of Life and is no longer supported. This documentation is available for historical purposes only. See the IDP30 and SP3 wiki spaces for current documentation on the supported versions.

Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 8 Next »

This page provides easier access to the complete history of Security Advisories released for the Shibboleth V2 software products and an "at a glance" table showing you which releases are vulnerable to what kinds of issues. If you're running a particular version, you can use this table to identify the issues that could affect your system and determine how urgent an upgrade is. In addition to the announce mailing list, you can "watch" this page for changes to keep abreast. Pages exist describing briefly how to check the IdP or SP version you have.

As always, sites are advised to use the latest stable release of any Shibboleth product. Refer to the ProductVersioning page for information about our support and versioning policies. The Home page identifies the specific versions recommended at a given point in time

This page only covers advisories affecting the V2 products. Older advisories affecting only V1 software are not listed here, but you can find the complete set of advisories going back to the original software in this directory. All V1 software has been end-of-life for several years now and any such deployments should be treated as highly suspect.

Obviously not all vulnerabilities are created equal, and the classifications in the matrices are general in nature, and are meant to point you to the relevant advisories to look into.

A particular minor version will typically be implicated by any advisories noted for it and for any newer versions. Advisories noted for "All" versions should be reviewed by all deployers for relevancy to their deployment.

Identity Provider Vulnerability Matrix

The oldest IdP version unaffected by fixable vulnerabilities is V2.3.6.

Minor VersionUser Data ExposureUser Data AccuracySession HijackingDenial of ServiceRemote ExploitAdvisories

2011-10-24, 2011-07-18, 2009-06-19

2.3XX   2012-02-27, 2011-07-25
2.2XXX X2011-05-16, 2011-01-13
2.1XXX X2009-11-04, 2009-02-24
2.0XXX X2008-11-03

Service Provider Vulnerability Matrix

The oldest SP version unaffected by fixable vulnerabilities is V2.4.3 (or more precisely any version using OpenSAML V2.4.3).

Minor VersionUser Data ExposureResource ExposureSession HijackingDenial of ServiceRemote ExploitAdvisories


2.4XX XX2012-04-19, 2011-07-25, 2011-07-06
2.3XX XX 
2.2XXXXX2009-11-04, 2009-08-26, 2009-08-17

Advisory List


OpenSSL ASN1 BIO vulnerability

SP w/ openssl < 1.0.0ihigh


2012-02-27Identity Provider LDAPS Connections Do Not Perform Hostname VerificationIDP < 2.3.6high 
2011-10-24Use of XML Encryption Vulnerable to Chosen Ciphertext AttacksSP and IdP, all versionsmedium 
2011-07-25OpenSAML software is vulnerable to XML Signature wrapping attacksIDP < 2.3.2
SP w/ libsaml < 2.4.3


2011-07-18Multi-Session Information Leakage IDP >= 2.1medium 
2011-07-06Shibboleth SP software crashes on large signing/encryption keys SP w/ libxml-security-c < 1.6.1high


2011-05-16Velocity templates vulnerable to XSS (cross-site scripting) injectionIDP < 2.3.0high 
2011-01-13Shibboleth IdP 2.X Single TransientID Mapped to Multiple PrincipalsIDP < 2.2.1high 
2009-11-04Shibboleth software improperly handles malformed URLsIDP < 2.1.5
SP < 2.3


2009-08-26Shibboleth SP software improperly handles malformed URLsSP w/ libxmltooling < 1.2.2high 
2009-08-17Shibboleth SP software improperly evaluates KeyDescriptorsSP < 2.2.1low 
2009-08-17Shibboleth SP software improperly handles certificate namesSP < 2.2.1 or w/ libcurl < 7.19.6high 
2009-06-19Potential Access to Sensitive Information when Clustering Shibboleth 2.X IdPsIDP, all versions w/ Terracottamedium 
2009-06-15Shibboleth SP software on IIS vulnerable to header spoofingSP < 2.2 w/ IIS, but see thishigh 
2009-02-24Shibboleth IdP 2.X cross-site request attackIDP < 2.2.0high 
2008-11-03Shibboleth IdP 2.0 UsernamePassword Login Handler Vulnerable to Cross-site Request AttackIDP < 2.1.0high 
  • No labels