ELA-1521-1 shibboleth-sp security update

SQL injection

2025-09-21
Packageshibboleth-sp
Version3.0.4+dfsg1-1+deb10u3 (buster)
Related CVEs CVE-2025-9943


An SQL injection vulnerability has been identified in the “ID” attribute of the SAML response when the replay cache of the Shibboleth Service Provider (SP) is configured to use an SQL database as storage service.

An unauthenticated attacker can exploit this issue via blind SQL injection, allowing for the extraction of arbitrary data from the database, if the database connection is configured to use the ODBC plugin.



For Debian 10 buster, these problems have been fixed in version 3.0.4+dfsg1-1+deb10u3.

We recommend that you upgrade your shibboleth-sp packages.

Further information about Extended LTS security advisories can be found in the dedicated section of our website.