Bug 1212359 - VUL-0: CVE-2023-36661: xmltooling: server-side request forgery (SSRF) vulnerability
Summary: VUL-0: CVE-2023-36661: xmltooling: server-side request forgery (SSRF) vulnera...
Status: RESOLVED FIXED
Alias: None
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL:
Whiteboard: CVSSv3.1:SUSE:CVE-2023-36661:5.4:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2023-06-14 10:55 UTC by Gianluca Gabrielli
Modified: 2023-08-14 07:40 UTC (History)
3 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments
patch (2.42 KB, patch)
2023-06-14 11:22 UTC, Gianluca Gabrielli
Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description Gianluca Gabrielli 2023-06-14 10:55:35 UTC
An updated version of the XMLTooling library that is part of the
OpenSAML and Shibboleth Service Provider software is now available
which corrects a server-side request forgery (SSRF) vulnerability.

Parsing of KeyInfo elements can cause remote resource access.
=============================================================
Including certain legal but "malicious in intent" content in the
KeyInfo element defined by the XML Signature standard will result
in attempts by the SP's shibd process to dereference untrusted
URLs.

While the content of the URL must be supplied within the message
and does not include any SP internal state or dynamic content,
there is at minimum a risk of denial of service, and the attack
could be combined with others to create more serious vulnerabilities
in the future.

This issue is *not* specific to the V3 XMLTooling software and is
believed to impact all versions prior to V3.2.4.

Recommendations
===============
Update to V3.2.4 or later of the XMLTooling library, which is
now available. Note that on Linux and similar platforms, upgrading
this component will require restarting the shibd process to correct
the bug.

The updated version of the library has been included in a V3.4.1.3
patch release of the Service Provider software on Windows.

Other Notes
===========
The xmltooling git commit containing the fix for this issue is
6080f6343f98fec085bc0fd746913ee418cc9d30 and may be in general terms
applicable to V2 of the library.

Credits
=======
Juriën de Jong, an independent security researcher in the Netherlands

URL for this Security Advisory:
https://shibboleth.net/community/advisories/secadv_20230612.txt
Comment 1 Gianluca Gabrielli 2023-06-14 11:01:40 UTC
Since no CVE ID is assigned I requested one from Mitre. I'll update this bug once I get updates from them.
Comment 2 Gianluca Gabrielli 2023-06-14 11:22:03 UTC
Created attachment 867570 [details]
patch
Comment 4 Cathy Hu 2023-06-20 10:26:35 UTC
Fix: https://git.shibboleth.net/view/?p=cpp-xmltooling.git;a=commit;h=6080f6343f98fec085bc0fd746913ee418cc9d30

Affected:    
- SUSE:SLE-12-SP1:Update/xmltooling     1.5.6    
- SUSE:SLE-15:Update/xmltooling         1.6.4    
- SUSE:SLE-15-SP3:Update/xmltooling     3.1.0    
- openSUSE:Factory/xmltooling           3.2.3    
    
Not Affected:    
- SUSE:SLE-12-SP1:Update/shibboleth-sp  2.5.5    
- SUSE:SLE-15-SP3:Update/shibboleth-sp  3.1.0    
- SUSE:SLE-15:Update/shibboleth-sp      2.6.1    
- openSUSE:Factory/shibboleth-sp        3.4.1
Comment 6 Cathy Hu 2023-06-26 08:18:36 UTC
they assigned CVE-2023-36661
Comment 7 Maintenance Automation 2023-07-03 20:30:04 UTC
SUSE-SU-2023:2766-1: An update that solves one vulnerability can now be installed.

Category: security (moderate)
Bug References: 1212359
CVE References: CVE-2023-36661
Sources used:
openSUSE Leap 15.4 (src): xmltooling-1.6.4-150000.3.10.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 8 Maintenance Automation 2023-07-26 08:52:09 UTC
SUSE-SU-2023:2975-1: An update that solves one vulnerability can now be installed.

Category: security (moderate)
Bug References: 1212359
CVE References: CVE-2023-36661
Sources used:
SUSE Linux Enterprise Software Development Kit 12 SP5 (src): xmltooling-1.5.6-3.13.1
SUSE Linux Enterprise High Performance Computing 12 SP5 (src): xmltooling-1.5.6-3.13.1
SUSE Linux Enterprise Server 12 SP5 (src): xmltooling-1.5.6-3.13.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): xmltooling-1.5.6-3.13.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 9 Maintenance Automation 2023-08-01 12:30:33 UTC
SUSE-SU-2023:3089-1: An update that solves one vulnerability can now be installed.

Category: security (moderate)
Bug References: 1212359
CVE References: CVE-2023-36661
Sources used:
openSUSE Leap 15.4 (src): xmltooling-3.1.0-150300.3.3.1
openSUSE Leap 15.5 (src): xmltooling-3.1.0-150300.3.3.1
Server Applications Module 15-SP4 (src): xmltooling-3.1.0-150300.3.3.1
Server Applications Module 15-SP5 (src): xmltooling-3.1.0-150300.3.3.1
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): xmltooling-3.1.0-150300.3.3.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): xmltooling-3.1.0-150300.3.3.1
SUSE Linux Enterprise Real Time 15 SP3 (src): xmltooling-3.1.0-150300.3.3.1
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): xmltooling-3.1.0-150300.3.3.1
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): xmltooling-3.1.0-150300.3.3.1
SUSE Manager Proxy 4.2 (src): xmltooling-3.1.0-150300.3.3.1
SUSE Manager Retail Branch Server 4.2 (src): xmltooling-3.1.0-150300.3.3.1
SUSE Manager Server 4.2 (src): xmltooling-3.1.0-150300.3.3.1
SUSE Enterprise Storage 7.1 (src): xmltooling-3.1.0-150300.3.3.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.