Shibboleth Service Provider vulnerabilities

8 known vulnerabilities affecting shibboleth/service_provider.

Total CVEs
8
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH5MEDIUM2

Vulnerabilities

Page 1 of 1
CVE-2025-9943CRITICALCVSS 9.1≤ 3.5.02025-09-10
CVE-2025-9943 [CRITICAL] CWE-89 CVE-2025-9943: An SQL injection vulnerability has been identified in the "ID" attribute of the SAML response when t An SQL injection vulnerability has been identified in the "ID" attribute of the SAML response when the replay cache of the Shibboleth Service Provider (SP) is configured to use an SQL database as storage service. An unauthenticated attacker can exploit this issue via blind SQL injection, allowing for the extraction of arbitrary data from the database
cvelistv5nvd
CVE-2023-22947HIGHCVSS 7.3fixed in 3.4.12023-01-11
CVE-2023-22947 [HIGH] CWE-427 CVE-2023-22947: Insecure folder permissions in the Windows installation path of Shibboleth Service Provider (SP) bef Insecure folder permissions in the Windows installation path of Shibboleth Service Provider (SP) before 3.4.1 allow an unprivileged local attacker to escalate privileges to SYSTEM via DLL planting in the service executable's folder. This occurs because the installation goes under C:\opt (rather than C:\Program Files) by default. NOTE: the vendor dispu
nvd
CVE-2021-31826HIGHCVSS 7.5≥ 3.0.0, < 3.2.22021-04-27
CVE-2021-31826 [HIGH] CWE-476 CVE-2021-31826: Shibboleth Service Provider 3.x before 3.2.2 is prone to a NULL pointer dereference flaw involving t Shibboleth Service Provider 3.x before 3.2.2 is prone to a NULL pointer dereference flaw involving the session recovery feature. The flaw is exploitable (for a daemon crash) on systems not using this feature if a crafted cookie is supplied.
nvd
CVE-2021-28963MEDIUMCVSS 5.3fixed in 3.2.12021-03-22
CVE-2021-28963 [MEDIUM] CWE-74 CVE-2021-28963: Shibboleth Service Provider before 3.2.1 allows content injection because template generation uses a Shibboleth Service Provider before 3.2.1 allows content injection because template generation uses attacker-controlled parameters.
nvd
CVE-2019-19191HIGHCVSS 7.8≥ 3.0.0, < 3.1.02019-11-21
CVE-2019-19191 [HIGH] CWE-59 CVE-2019-19191: Shibboleth Service Provider (SP) 3.x before 3.1.0 shipped a spec file that calls chown on files in a Shibboleth Service Provider (SP) 3.x before 3.1.0 shipped a spec file that calls chown on files in a directory controlled by the service user (the shibd account) after installation. This allows the user to escalate to root by pointing symlinks to files such as /etc/shadow.
nvd
CVE-2010-2450HIGHCVSS 7.5v2.02019-11-07
CVE-2010-2450 [HIGH] CWE-200 CVE-2010-2450: The keygen.sh script in Shibboleth SP 2.0 (located in /usr/local/etc/shibboleth by default) uses Ope The keygen.sh script in Shibboleth SP 2.0 (located in /usr/local/etc/shibboleth by default) uses OpenSSL to create a DES private key which is placed in sp-key.pm. It relies on the root umask (default 22) instead of chmoding the resulting file itself, so the generated private key is world readable by default.
nvd
CVE-2017-16852HIGHCVSS 8.1fixed in 2.6.12017-11-16
CVE-2017-16852 [HIGH] CWE-347 CVE-2017-16852: shibsp/metadata/DynamicMetadataProvider.cpp in the Dynamic MetadataProvider plugin in Shibboleth Ser shibsp/metadata/DynamicMetadataProvider.cpp in the Dynamic MetadataProvider plugin in Shibboleth Service Provider before 2.6.1 fails to properly configure itself with the MetadataFilter plugins and does not perform critical security checks such as signature verification, enforcement of validity periods, and other checks specific to deployments, aka SS
nvd
CVE-2015-2684MEDIUMCVSS 4.0≤ 2.5.32015-03-31
CVE-2015-2684 [MEDIUM] CWE-20 CVE-2015-2684: Shibboleth Service Provider (SP) before 2.5.4 allows remote authenticated users to cause a denial of Shibboleth Service Provider (SP) before 2.5.4 allows remote authenticated users to cause a denial of service (crash) via a crafted SAML message.
nvd