ruby-saml 1.1.1 → 1.1.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of ruby-saml might be problematic. Click here for more details.
- data/README.md +3 -3
- data/changelog.md +9 -0
- data/lib/onelogin/ruby-saml/idp_metadata_parser.rb +16 -6
- data/lib/onelogin/ruby-saml/response.rb +53 -11
- data/lib/onelogin/ruby-saml/settings.rb +4 -4
- data/lib/onelogin/ruby-saml/utils.rb +1 -1
- data/lib/onelogin/ruby-saml/version.rb +1 -1
- data/test/response_test.rb +30 -4
- data/test/responses/invalids/signature_wrapping_attack.xml.base64 +1 -0
- data/test/xml_security_test.rb +9 -0
- metadata +177 -142
- checksums.yaml +0 -7
data/README.md
CHANGED
@@ -102,7 +102,7 @@ To override the default behavior and control the destination of log messages, pr
|
|
102
102
|
a ruby Logger object to the gem's logging singleton:
|
103
103
|
|
104
104
|
```ruby
|
105
|
-
OneLogin::RubySaml::Logging.logger = Logger.new(File.open('/var/log/ruby-saml.log', 'w')
|
105
|
+
OneLogin::RubySaml::Logging.logger = Logger.new(File.open('/var/log/ruby-saml.log', 'w'))
|
106
106
|
```
|
107
107
|
|
108
108
|
## The Initialization Phase
|
@@ -252,9 +252,9 @@ def saml_settings
|
|
252
252
|
end
|
253
253
|
```
|
254
254
|
The following attributes are set:
|
255
|
-
*
|
255
|
+
* idp_sso_target_url
|
256
256
|
* idp_slo_target_url
|
257
|
-
*
|
257
|
+
* idp_cert_fingerpint
|
258
258
|
|
259
259
|
If you are using saml:AttributeStatement to transfer metadata, like the user name, you can access all the attributes through response.attributes. It contains all the saml:AttributeStatement with its 'Name' as a indifferent key the one/more saml:AttributeValue as value. The value returned depends on the value of the
|
260
260
|
`single_value_compatibility` (when activate, only one value returned, the first one)
|
data/changelog.md
CHANGED
@@ -1,5 +1,14 @@
|
|
1
1
|
# RubySaml Changelog
|
2
2
|
|
3
|
+
### 1.1.2 (February 15, 2015)
|
4
|
+
* Improve signature validation. Add tests.
|
5
|
+
[#302](https://github.com/onelogin/ruby-saml/pull/302) Add Destination validation.
|
6
|
+
* [#292](https://github.com/onelogin/ruby-saml/pull/292) Improve the error message when validating the audience.
|
7
|
+
* [#287](https://github.com/onelogin/ruby-saml/pull/287) Keep the extracted certificate when parsing IdP metadata.
|
8
|
+
|
9
|
+
### 1.1.1 (November 10, 2015)
|
10
|
+
* [#275](https://github.com/onelogin/ruby-saml/pull/275) Fix a bug on signature validations that invalidates valid SAML messages.
|
11
|
+
|
3
12
|
### 1.1.0 (October 27, 2015)
|
4
13
|
* [#273](https://github.com/onelogin/ruby-saml/pull/273) Support SAMLResponse without ds:x509certificate
|
5
14
|
* [#270](https://github.com/onelogin/ruby-saml/pull/270) Allow SAML elements to come from any namespace (at decryption process)
|
@@ -44,6 +44,7 @@ module OneLogin
|
|
44
44
|
settings.name_identifier_format = idp_name_id_format
|
45
45
|
settings.idp_sso_target_url = single_signon_service_url
|
46
46
|
settings.idp_slo_target_url = single_logout_service_url
|
47
|
+
settings.idp_cert = certificate_base64
|
47
48
|
settings.idp_cert_fingerprint = fingerprint
|
48
49
|
end
|
49
50
|
end
|
@@ -133,19 +134,28 @@ module OneLogin
|
|
133
134
|
node.value if node
|
134
135
|
end
|
135
136
|
|
137
|
+
# @return [String|nil] Unformatted Certificate if exists
|
138
|
+
#
|
139
|
+
def certificate_base64
|
140
|
+
@certificate_base64 ||= begin
|
141
|
+
node = REXML::XPath.first(
|
142
|
+
document,
|
143
|
+
"/md:EntityDescriptor/md:IDPSSODescriptor/md:KeyDescriptor[@use='signing']/ds:KeyInfo/ds:X509Data/ds:X509Certificate",
|
144
|
+
{ "md" => METADATA, "ds" => DSIG }
|
145
|
+
)
|
146
|
+
node.text if node
|
147
|
+
end
|
148
|
+
end
|
149
|
+
|
136
150
|
# @return [String|nil] X509Certificate if exists
|
137
151
|
#
|
138
152
|
def certificate
|
139
153
|
@certificate ||= begin
|
140
|
-
|
141
|
-
document,
|
142
|
-
"/md:EntityDescriptor/md:IDPSSODescriptor/md:KeyDescriptor[@use='signing']/ds:KeyInfo/ds:X509Data/ds:X509Certificate",
|
143
|
-
{ "md" => METADATA, "ds" => DSIG }
|
144
|
-
)
|
145
|
-
Base64.decode64(node.text) if node
|
154
|
+
Base64.decode64(certificate_base64) if certificate_base64
|
146
155
|
end
|
147
156
|
end
|
148
157
|
|
158
|
+
|
149
159
|
# @return [String|nil] the SHA-1 fingerpint of the X509Certificate if it exists
|
150
160
|
#
|
151
161
|
def fingerprint
|
@@ -254,6 +254,19 @@ module OneLogin
|
|
254
254
|
end
|
255
255
|
end
|
256
256
|
|
257
|
+
# @return [String|nil] Destination attribute from the SAML Response.
|
258
|
+
#
|
259
|
+
def destination
|
260
|
+
@destination ||= begin
|
261
|
+
node = REXML::XPath.first(
|
262
|
+
document,
|
263
|
+
"/p:Response",
|
264
|
+
{ "p" => PROTOCOL }
|
265
|
+
)
|
266
|
+
node.nil? ? nil : node.attributes['Destination']
|
267
|
+
end
|
268
|
+
end
|
269
|
+
|
257
270
|
# @return [Array] The Audience elements from the Contitions of the SAML Response.
|
258
271
|
#
|
259
272
|
def audiences
|
@@ -295,6 +308,7 @@ module OneLogin
|
|
295
308
|
validate_in_response_to &&
|
296
309
|
validate_conditions &&
|
297
310
|
validate_audience &&
|
311
|
+
validate_destination &&
|
298
312
|
validate_issuer &&
|
299
313
|
validate_session_expiration &&
|
300
314
|
validate_subject_confirmation &&
|
@@ -454,7 +468,22 @@ module OneLogin
|
|
454
468
|
return true if audiences.empty? || settings.issuer.nil? || settings.issuer.empty?
|
455
469
|
|
456
470
|
unless audiences.include? settings.issuer
|
457
|
-
error_msg = "#{settings.issuer} is not a valid audience for this Response"
|
471
|
+
error_msg = "#{settings.issuer} is not a valid audience for this Response - Valid audiences: #{audiences.join(',')}"
|
472
|
+
return append_error(error_msg)
|
473
|
+
end
|
474
|
+
|
475
|
+
true
|
476
|
+
end
|
477
|
+
|
478
|
+
# Validates the Destination, (If the SAML Response is received where expected)
|
479
|
+
# If fails, the error is added to the errors array
|
480
|
+
# @return [Boolean] True if there is a Destination element that matches the Consumer Service URL, otherwise False
|
481
|
+
#
|
482
|
+
def validate_destination
|
483
|
+
return true if destination.nil? || destination.empty? || settings.assertion_consumer_service_url.nil? || settings.assertion_consumer_service_url.empty?
|
484
|
+
|
485
|
+
unless destination == settings.assertion_consumer_service_url
|
486
|
+
error_msg = "The response was received at #{destination} instead of #{settings.assertion_consumer_service_url}"
|
458
487
|
return append_error(error_msg)
|
459
488
|
end
|
460
489
|
|
@@ -571,25 +600,38 @@ module OneLogin
|
|
571
600
|
# @raise [ValidationError] if soft == false and validation fails
|
572
601
|
#
|
573
602
|
def validate_signature
|
574
|
-
|
575
|
-
idp_cert = settings.get_idp_cert
|
603
|
+
error_msg = "Invalid Signature on SAML Response"
|
576
604
|
|
577
605
|
# If the response contains the signature, and the assertion was encrypted, validate the original SAML Response
|
578
606
|
# otherwise, review if the decrypted assertion contains a signature
|
579
|
-
|
607
|
+
sig_elements = REXML::XPath.match(
|
580
608
|
document,
|
581
|
-
"/p:Response
|
582
|
-
{ "p" => PROTOCOL, "ds" => DSIG }
|
583
|
-
{ 'id' => document.signed_element_id }
|
609
|
+
"/p:Response/ds:Signature]",
|
610
|
+
{ "p" => PROTOCOL, "ds" => DSIG }
|
584
611
|
)
|
585
|
-
|
612
|
+
|
613
|
+
use_original = sig_elements.size == 1 || decrypted_document.nil?
|
614
|
+
doc = use_original ? document : decrypted_document
|
615
|
+
|
616
|
+
# Check signature nodes
|
617
|
+
if sig_elements.nil? || sig_elements.size == 0
|
618
|
+
sig_elements = REXML::XPath.match(
|
619
|
+
doc,
|
620
|
+
"/p:Response/a:Assertion/ds:Signature",
|
621
|
+
{"p" => PROTOCOL, "a" => ASSERTION, "ds"=>DSIG}
|
622
|
+
)
|
623
|
+
end
|
624
|
+
|
625
|
+
if sig_elements.size != 1
|
626
|
+
return append_error(error_msg)
|
627
|
+
end
|
586
628
|
|
587
629
|
opts = {}
|
588
630
|
opts[:fingerprint_alg] = settings.idp_cert_fingerprint_algorithm
|
589
|
-
opts[:cert] =
|
631
|
+
opts[:cert] = settings.get_idp_cert
|
632
|
+
fingerprint = settings.get_fingerprint
|
590
633
|
|
591
|
-
unless fingerprint && doc.validate_document(fingerprint, @soft, opts)
|
592
|
-
error_msg = "Invalid Signature on SAML Response"
|
634
|
+
unless fingerprint && doc.validate_document(fingerprint, @soft, opts)
|
593
635
|
return append_error(error_msg)
|
594
636
|
end
|
595
637
|
|
@@ -118,8 +118,8 @@ module OneLogin
|
|
118
118
|
def get_idp_cert
|
119
119
|
return nil if idp_cert.nil? || idp_cert.empty?
|
120
120
|
|
121
|
-
|
122
|
-
OpenSSL::X509::Certificate.new(
|
121
|
+
formatted_cert = OneLogin::RubySaml::Utils.format_cert(idp_cert)
|
122
|
+
OpenSSL::X509::Certificate.new(formatted_cert)
|
123
123
|
end
|
124
124
|
|
125
125
|
# @return [OpenSSL::X509::Certificate|nil] Build the SP certificate from the settings (previously format it)
|
@@ -127,8 +127,8 @@ module OneLogin
|
|
127
127
|
def get_sp_cert
|
128
128
|
return nil if certificate.nil? || certificate.empty?
|
129
129
|
|
130
|
-
|
131
|
-
OpenSSL::X509::Certificate.new(
|
130
|
+
formatted_cert = OneLogin::RubySaml::Utils.format_cert(certificate)
|
131
|
+
OpenSSL::X509::Certificate.new(formatted_cert)
|
132
132
|
end
|
133
133
|
|
134
134
|
# @return [OpenSSL::PKey::RSA] Build the SP private from the settings (previously format it)
|
@@ -65,7 +65,7 @@ module OneLogin
|
|
65
65
|
# @option params [OpenSSL::X509::Certificate] cert The Identity provider public certtificate
|
66
66
|
# @option params [String] sig_alg The SigAlg parameter
|
67
67
|
# @option params [String] signature The Signature parameter (base64 encoded)
|
68
|
-
# @option params [String] query_string The
|
68
|
+
# @option params [String] query_string The full GET Query String to be compared
|
69
69
|
# @return [Boolean] True if the Signature is valid, False otherwise
|
70
70
|
#
|
71
71
|
def self.verify_signature(params)
|
data/test/response_test.rb
CHANGED
@@ -204,7 +204,7 @@ class RubySamlTest < Minitest::Test
|
|
204
204
|
settings.issuer = 'invalid'
|
205
205
|
response_valid_signed.settings = settings
|
206
206
|
response_valid_signed.soft = false
|
207
|
-
error_msg = "#{response_valid_signed.settings.issuer} is not a valid audience for this Response"
|
207
|
+
error_msg = "#{response_valid_signed.settings.issuer} is not a valid audience for this Response - Valid audiences: https://someone.example.com/audience"
|
208
208
|
assert_raises(OneLogin::RubySaml::ValidationError, error_msg) do
|
209
209
|
response_valid_signed.is_valid?
|
210
210
|
end
|
@@ -368,7 +368,7 @@ class RubySamlTest < Minitest::Test
|
|
368
368
|
settings.issuer = 'invalid'
|
369
369
|
response_valid_signed.settings = settings
|
370
370
|
response_valid_signed.is_valid?
|
371
|
-
assert_includes response_valid_signed.errors, "#{response_valid_signed.settings.issuer} is not a valid audience for this Response"
|
371
|
+
assert_includes response_valid_signed.errors, "#{response_valid_signed.settings.issuer} is not a valid audience for this Response - Valid audiences: https://someone.example.com/audience"
|
372
372
|
end
|
373
373
|
|
374
374
|
it "return false when no ID present in the SAML Response" do
|
@@ -411,7 +411,22 @@ class RubySamlTest < Minitest::Test
|
|
411
411
|
response.settings = settings
|
412
412
|
response.settings.issuer = 'invalid_audience'
|
413
413
|
assert !response.send(:validate_audience)
|
414
|
-
assert_includes response.errors, "#{response.settings.issuer} is not a valid audience for this Response"
|
414
|
+
assert_includes response.errors, "#{response.settings.issuer} is not a valid audience for this Response - Valid audiences: {audience}"
|
415
|
+
end
|
416
|
+
end
|
417
|
+
|
418
|
+
describe "#validate_destination" do
|
419
|
+
it "return true when the destination of the SAML Response matches the assertion consumer service url" do
|
420
|
+
response.settings = settings
|
421
|
+
assert response.send(:validate_destination)
|
422
|
+
assert_empty response.errors
|
423
|
+
end
|
424
|
+
|
425
|
+
it "return false when the destination of the SAML Response does not match the assertion consumer service url" do
|
426
|
+
response.settings = settings
|
427
|
+
response.settings.assertion_consumer_service_url = 'invalid_acs'
|
428
|
+
assert !response.send(:validate_destination)
|
429
|
+
assert_includes response.errors, "The response was received at #{response.destination} instead of #{response.settings.assertion_consumer_service_url}"
|
415
430
|
end
|
416
431
|
end
|
417
432
|
|
@@ -551,7 +566,7 @@ class RubySamlTest < Minitest::Test
|
|
551
566
|
response_invalid_audience.settings = settings
|
552
567
|
response_invalid_audience.settings.issuer = "https://invalid.example.com/audience"
|
553
568
|
assert !response_invalid_audience.send(:validate_audience)
|
554
|
-
assert_includes response_invalid_audience.errors, "#{response_invalid_audience.settings.issuer} is not a valid audience for this Response"
|
569
|
+
assert_includes response_invalid_audience.errors, "#{response_invalid_audience.settings.issuer} is not a valid audience for this Response - Valid audiences: http://invalid.audience.com"
|
555
570
|
end
|
556
571
|
end
|
557
572
|
|
@@ -729,6 +744,17 @@ class RubySamlTest < Minitest::Test
|
|
729
744
|
assert response_valid_signed_without_x509certificate.send(:validate_signature)
|
730
745
|
assert_empty response_valid_signed_without_x509certificate.errors
|
731
746
|
end
|
747
|
+
|
748
|
+
it "return false when signature wrapping attack" do
|
749
|
+
signature_wrapping_attack = read_invalid_response("signature_wrapping_attack.xml.base64")
|
750
|
+
response_wrapped = OneLogin::RubySaml::Response.new(signature_wrapping_attack)
|
751
|
+
response_wrapped.stubs(:conditions).returns(nil)
|
752
|
+
response_wrapped.stubs(:validate_subject_confirmation).returns(true)
|
753
|
+
settings.idp_cert_fingerprint = "afe71c28ef740bc87425be13a2263d37971da1f9"
|
754
|
+
response_wrapped.settings = settings
|
755
|
+
assert !response_wrapped.send(:validate_signature)
|
756
|
+
assert_includes response_wrapped.errors, "Invalid Signature on SAML Response"
|
757
|
+
end
|
732
758
|
end
|
733
759
|
|
734
760
|
describe "#nameid" do
|
@@ -0,0 +1 @@
|
|
1
|
+
<samlp:Response xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol" xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion" ID="pfxc3d2b542-0f7e-8767-8e87-5b0dc6913375" Version="2.0" IssueInstant="2014-03-21T13:41:09Z" Destination="https://pitbulk.no-ip.org/newonelogin/demo1/index.php?acs" InResponseTo="ONELOGIN_5d9e319c1b8a67da48227964c28d280e7860f804"><saml:Issuer>https://pitbulk.no-ip.org/simplesaml/saml2/idp/metadata.php</saml:Issuer><samlp:Status><samlp:StatusDetail><samlp:Response xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol" xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion" ID="pfxc3d2b542-0f7e-8767-8e87-5b0dc6913375" Version="2.0" IssueInstant="2014-03-21T13:41:09Z" Destination="https://pitbulk.no-ip.org/newonelogin/demo1/index.php?acs" InResponseTo="ONELOGIN_5d9e319c1b8a67da48227964c28d280e7860f804"><saml:Issuer>https://pitbulk.no-ip.org/simplesaml/saml2/idp/metadata.php</saml:Issuer><ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
  <ds:SignedInfo><ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
    <ds:SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1"/>
  <ds:Reference URI="#pfxc3d2b542-0f7e-8767-8e87-5b0dc6913375"><ds:Transforms><ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/><ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/></ds:Transforms><ds:DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/><ds:DigestValue>1dQFiYU0o2OF7c/RVV8Gpgb4u3I=</ds:DigestValue></ds:Reference></ds:SignedInfo><ds:SignatureValue>wRgBXOq/FiLZc2mureTC/j6zY709OikJ5HeUSruHTdYjEg9aZy1RbxlKIYEIfXpnX7NBoKxfAMm+O0fsrqOjgcYxTVkqZjOr71qiXNbtwjeAkdYSpk5brsAcnfcPdv8QReYr3D7t5ZVCgYuvXQ+dNELKeag7e1ASOzVqOdp5Z9Y=</ds:SignatureValue>
<ds:KeyInfo><ds:X509Data><ds:X509Certificate>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</ds:X509Certificate></ds:X509Data></ds:KeyInfo></ds:Signature><samlp:Status><samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/></samlp:Status><saml:Assertion xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xs="http://www.w3.org/2001/XMLSchema" ID="_cccd6024116641fe48e0ae2c51220d02755f96c98d" Version="2.0" IssueInstant="2014-03-21T13:41:09Z"><saml:Issuer>https://pitbulk.no-ip.org/simplesaml/saml2/idp/metadata.php</saml:Issuer><saml:Subject><saml:NameID SPNameQualifier="https://pitbulk.no-ip.org/newonelogin/demo1/metadata.php" Format="urn:oasis:names:tc:SAML:2.0:nameid-format:transient">_b98f98bb1ab512ced653b58baaff543448daed535d</saml:NameID><saml:SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer"><saml:SubjectConfirmationData NotOnOrAfter="2023-09-22T19:01:09Z" Recipient="https://pitbulk.no-ip.org/newonelogin/demo1/index.php?acs" InResponseTo="ONELOGIN_5d9e319c1b8a67da48227964c28d280e7860f804"/></saml:SubjectConfirmation></saml:Subject><saml:Conditions NotBefore="2014-03-21T13:40:39Z" NotOnOrAfter="2023-09-22T19:01:09Z"><saml:AudienceRestriction><saml:Audience>https://pitbulk.no-ip.org/newonelogin/demo1/metadata.php</saml:Audience></saml:AudienceRestriction></saml:Conditions><saml:AuthnStatement AuthnInstant="2014-03-21T13:41:09Z" SessionNotOnOrAfter="2014-03-21T21:41:09Z" SessionIndex="_9fe0c8dcd3302e7364fcab22a52748ebf2224df0aa"><saml:AuthnContext><saml:AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:Password</saml:AuthnContextClassRef></saml:AuthnContext></saml:AuthnStatement><saml:AttributeStatement><saml:Attribute Name="uid" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xsi:type="xs:string">test</saml:AttributeValue></saml:Attribute><saml:Attribute Name="mail" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xsi:type="xs:string">test@example.com</saml:AttributeValue></saml:Attribute><saml:Attribute Name="cn" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xsi:type="xs:string">test</saml:AttributeValue></saml:Attribute><saml:Attribute Name="sn" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xsi:type="xs:string">waa2</saml:AttributeValue></saml:Attribute><saml:Attribute Name="eduPersonAffiliation" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xsi:type="xs:string">user</saml:AttributeValue><saml:AttributeValue xsi:type="xs:string">admin</saml:AttributeValue></saml:Attribute></saml:AttributeStatement></saml:Assertion></samlp:Response></samlp:StatusDetail><samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/></samlp:Status><saml:Assertion xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xs="http://www.w3.org/2001/XMLSchema" ID="_cccd6024116641fe48e0ae2c51220d02755f96c98d" Version="2.0" IssueInstant="2014-03-21T13:41:09Z"><saml:Issuer>https://pitbulk.no-ip.org/simplesaml/saml2/idp/metadata.php</saml:Issuer><saml:Subject><saml:NameID SPNameQualifier="https://pitbulk.no-ip.org/newonelogin/demo1/metadata.php" Format="urn:oasis:names:tc:SAML:2.0:nameid-format:transient">_b98f98bb1ab512ced653b58baaff543448daed535d</saml:NameID><saml:SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer"><saml:SubjectConfirmationData NotOnOrAfter="2023-09-22T19:01:09Z" Recipient="https://pitbulk.no-ip.org/newonelogin/demo1/index.php?acs" InResponseTo="ONELOGIN_5d9e319c1b8a67da48227964c28d280e7860f804"/></saml:SubjectConfirmation></saml:Subject><saml:Conditions NotBefore="2014-03-21T13:40:39Z" NotOnOrAfter="2023-09-22T19:01:09Z"><saml:AudienceRestriction><saml:Audience>https://pitbulk.no-ip.org/newonelogin/demo1/metadata.php</saml:Audience></saml:AudienceRestriction></saml:Conditions><saml:AuthnStatement AuthnInstant="2014-03-21T13:41:09Z" SessionNotOnOrAfter="2023-03-21T21:41:09Z" SessionIndex="_9fe0c8dcd3302e7364fcab22a52748ebf2224df0aa"><saml:AuthnContext><saml:AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:Password</saml:AuthnContextClassRef></saml:AuthnContext></saml:AuthnStatement><saml:AttributeStatement><saml:Attribute Name="uid" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xsi:type="xs:string">hacker</saml:AttributeValue></saml:Attribute><saml:Attribute Name="mail" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xsi:type="xs:string">hacker@example.com</saml:AttributeValue></saml:Attribute><saml:Attribute Name="cn" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xsi:type="xs:string">hacker</saml:AttributeValue></saml:Attribute><saml:Attribute Name="sn" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xsi:type="xs:string">waa2</saml:AttributeValue></saml:Attribute><saml:Attribute Name="eduPersonAffiliation" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xsi:type="xs:string">user</saml:AttributeValue><saml:AttributeValue xsi:type="xs:string">admin</saml:AttributeValue></saml:Attribute></saml:AttributeStatement></saml:Assertion></samlp:Response>
|
data/test/xml_security_test.rb
CHANGED
@@ -343,6 +343,15 @@ class XmlSecurityTest < Minitest::Test
|
|
343
343
|
end
|
344
344
|
end
|
345
345
|
end
|
346
|
+
describe 'signature_wrapping_attack' do
|
347
|
+
let(:document_data) { read_invalid_response("signature_wrapping_attack.xml.base64") }
|
348
|
+
let(:document) { OneLogin::RubySaml::Response.new(document_data).document }
|
349
|
+
let(:fingerprint) { 'afe71c28ef740bc87425be13a2263d37971da1f9' }
|
350
|
+
|
351
|
+
it 'is invalid' do
|
352
|
+
assert !document.validate_document(fingerprint, true), 'Document should be invalid'
|
353
|
+
end
|
354
|
+
end
|
346
355
|
end
|
347
356
|
end
|
348
357
|
end
|
metadata
CHANGED
@@ -1,166 +1,188 @@
|
|
1
|
-
--- !ruby/object:Gem::Specification
|
1
|
+
--- !ruby/object:Gem::Specification
|
2
2
|
name: ruby-saml
|
3
|
-
version: !ruby/object:Gem::Version
|
4
|
-
|
3
|
+
version: !ruby/object:Gem::Version
|
4
|
+
hash: 23
|
5
|
+
prerelease: false
|
6
|
+
segments:
|
7
|
+
- 1
|
8
|
+
- 1
|
9
|
+
- 2
|
10
|
+
version: 1.1.2
|
5
11
|
platform: ruby
|
6
|
-
authors:
|
12
|
+
authors:
|
7
13
|
- OneLogin LLC
|
8
14
|
autorequire:
|
9
15
|
bindir: bin
|
10
16
|
cert_chain: []
|
11
|
-
|
12
|
-
|
13
|
-
|
17
|
+
|
18
|
+
date: 2016-02-15 00:00:00 +01:00
|
19
|
+
default_executable:
|
20
|
+
dependencies:
|
21
|
+
- !ruby/object:Gem::Dependency
|
14
22
|
name: uuid
|
15
|
-
requirement: !ruby/object:Gem::Requirement
|
16
|
-
requirements:
|
17
|
-
- - "~>"
|
18
|
-
- !ruby/object:Gem::Version
|
19
|
-
version: '2.3'
|
20
|
-
type: :runtime
|
21
23
|
prerelease: false
|
22
|
-
|
23
|
-
|
24
|
-
|
25
|
-
|
26
|
-
|
27
|
-
|
28
|
-
|
29
|
-
|
30
|
-
|
31
|
-
|
32
|
-
- !ruby/object:Gem::Version
|
33
|
-
version: 1.5.10
|
24
|
+
requirement: &id001 !ruby/object:Gem::Requirement
|
25
|
+
none: false
|
26
|
+
requirements:
|
27
|
+
- - ~>
|
28
|
+
- !ruby/object:Gem::Version
|
29
|
+
hash: 5
|
30
|
+
segments:
|
31
|
+
- 2
|
32
|
+
- 3
|
33
|
+
version: "2.3"
|
34
34
|
type: :runtime
|
35
|
+
version_requirements: *id001
|
36
|
+
- !ruby/object:Gem::Dependency
|
37
|
+
name: nokogiri
|
35
38
|
prerelease: false
|
36
|
-
|
37
|
-
|
39
|
+
requirement: &id002 !ruby/object:Gem::Requirement
|
40
|
+
none: false
|
41
|
+
requirements:
|
38
42
|
- - ">="
|
39
|
-
- !ruby/object:Gem::Version
|
43
|
+
- !ruby/object:Gem::Version
|
44
|
+
hash: 23
|
45
|
+
segments:
|
46
|
+
- 1
|
47
|
+
- 5
|
48
|
+
- 10
|
40
49
|
version: 1.5.10
|
41
|
-
|
50
|
+
type: :runtime
|
51
|
+
version_requirements: *id002
|
52
|
+
- !ruby/object:Gem::Dependency
|
42
53
|
name: minitest
|
43
|
-
requirement: !ruby/object:Gem::Requirement
|
44
|
-
requirements:
|
45
|
-
- - "~>"
|
46
|
-
- !ruby/object:Gem::Version
|
47
|
-
version: '5.5'
|
48
|
-
type: :development
|
49
54
|
prerelease: false
|
50
|
-
|
51
|
-
|
52
|
-
|
53
|
-
|
54
|
-
|
55
|
-
|
56
|
-
|
57
|
-
|
58
|
-
|
59
|
-
|
60
|
-
- !ruby/object:Gem::Version
|
61
|
-
version: '0.14'
|
55
|
+
requirement: &id003 !ruby/object:Gem::Requirement
|
56
|
+
none: false
|
57
|
+
requirements:
|
58
|
+
- - ~>
|
59
|
+
- !ruby/object:Gem::Version
|
60
|
+
hash: 21
|
61
|
+
segments:
|
62
|
+
- 5
|
63
|
+
- 5
|
64
|
+
version: "5.5"
|
62
65
|
type: :development
|
66
|
+
version_requirements: *id003
|
67
|
+
- !ruby/object:Gem::Dependency
|
68
|
+
name: mocha
|
63
69
|
prerelease: false
|
64
|
-
|
65
|
-
|
66
|
-
|
67
|
-
|
68
|
-
|
69
|
-
|
70
|
-
|
71
|
-
|
72
|
-
|
73
|
-
|
74
|
-
- !ruby/object:Gem::Version
|
75
|
-
version: '10'
|
70
|
+
requirement: &id004 !ruby/object:Gem::Requirement
|
71
|
+
none: false
|
72
|
+
requirements:
|
73
|
+
- - ~>
|
74
|
+
- !ruby/object:Gem::Version
|
75
|
+
hash: 23
|
76
|
+
segments:
|
77
|
+
- 0
|
78
|
+
- 14
|
79
|
+
version: "0.14"
|
76
80
|
type: :development
|
81
|
+
version_requirements: *id004
|
82
|
+
- !ruby/object:Gem::Dependency
|
83
|
+
name: rake
|
77
84
|
prerelease: false
|
78
|
-
|
79
|
-
|
80
|
-
|
81
|
-
|
82
|
-
|
83
|
-
|
84
|
-
|
85
|
-
|
86
|
-
|
87
|
-
- - "~>"
|
88
|
-
- !ruby/object:Gem::Version
|
89
|
-
version: '2.11'
|
85
|
+
requirement: &id005 !ruby/object:Gem::Requirement
|
86
|
+
none: false
|
87
|
+
requirements:
|
88
|
+
- - ~>
|
89
|
+
- !ruby/object:Gem::Version
|
90
|
+
hash: 23
|
91
|
+
segments:
|
92
|
+
- 10
|
93
|
+
version: "10"
|
90
94
|
type: :development
|
95
|
+
version_requirements: *id005
|
96
|
+
- !ruby/object:Gem::Dependency
|
97
|
+
name: shoulda
|
91
98
|
prerelease: false
|
92
|
-
|
93
|
-
|
94
|
-
|
95
|
-
|
96
|
-
|
97
|
-
|
98
|
-
|
99
|
-
|
100
|
-
|
101
|
-
|
102
|
-
- !ruby/object:Gem::Version
|
103
|
-
version: 0.9.0
|
99
|
+
requirement: &id006 !ruby/object:Gem::Requirement
|
100
|
+
none: false
|
101
|
+
requirements:
|
102
|
+
- - ~>
|
103
|
+
- !ruby/object:Gem::Version
|
104
|
+
hash: 21
|
105
|
+
segments:
|
106
|
+
- 2
|
107
|
+
- 11
|
108
|
+
version: "2.11"
|
104
109
|
type: :development
|
110
|
+
version_requirements: *id006
|
111
|
+
- !ruby/object:Gem::Dependency
|
112
|
+
name: simplecov
|
105
113
|
prerelease: false
|
106
|
-
|
107
|
-
|
108
|
-
|
109
|
-
|
114
|
+
requirement: &id007 !ruby/object:Gem::Requirement
|
115
|
+
none: false
|
116
|
+
requirements:
|
117
|
+
- - ~>
|
118
|
+
- !ruby/object:Gem::Version
|
119
|
+
hash: 59
|
120
|
+
segments:
|
121
|
+
- 0
|
122
|
+
- 9
|
123
|
+
- 0
|
110
124
|
version: 0.9.0
|
111
|
-
- !ruby/object:Gem::Dependency
|
112
|
-
name: systemu
|
113
|
-
requirement: !ruby/object:Gem::Requirement
|
114
|
-
requirements:
|
115
|
-
- - "~>"
|
116
|
-
- !ruby/object:Gem::Version
|
117
|
-
version: '2'
|
118
125
|
type: :development
|
126
|
+
version_requirements: *id007
|
127
|
+
- !ruby/object:Gem::Dependency
|
128
|
+
name: systemu
|
119
129
|
prerelease: false
|
120
|
-
|
121
|
-
|
122
|
-
|
123
|
-
|
124
|
-
|
125
|
-
|
126
|
-
|
127
|
-
|
128
|
-
|
129
|
-
- - "<="
|
130
|
-
- !ruby/object:Gem::Version
|
131
|
-
version: 0.6.0
|
130
|
+
requirement: &id008 !ruby/object:Gem::Requirement
|
131
|
+
none: false
|
132
|
+
requirements:
|
133
|
+
- - ~>
|
134
|
+
- !ruby/object:Gem::Version
|
135
|
+
hash: 7
|
136
|
+
segments:
|
137
|
+
- 2
|
138
|
+
version: "2"
|
132
139
|
type: :development
|
140
|
+
version_requirements: *id008
|
141
|
+
- !ruby/object:Gem::Dependency
|
142
|
+
name: timecop
|
133
143
|
prerelease: false
|
134
|
-
|
135
|
-
|
136
|
-
|
137
|
-
|
144
|
+
requirement: &id009 !ruby/object:Gem::Requirement
|
145
|
+
none: false
|
146
|
+
requirements:
|
147
|
+
- - <=
|
148
|
+
- !ruby/object:Gem::Version
|
149
|
+
hash: 7
|
150
|
+
segments:
|
151
|
+
- 0
|
152
|
+
- 6
|
153
|
+
- 0
|
138
154
|
version: 0.6.0
|
139
|
-
- !ruby/object:Gem::Dependency
|
140
|
-
name: pry-byebug
|
141
|
-
requirement: !ruby/object:Gem::Requirement
|
142
|
-
requirements:
|
143
|
-
- - ">="
|
144
|
-
- !ruby/object:Gem::Version
|
145
|
-
version: '0'
|
146
155
|
type: :development
|
156
|
+
version_requirements: *id009
|
157
|
+
- !ruby/object:Gem::Dependency
|
158
|
+
name: ruby-debug
|
147
159
|
prerelease: false
|
148
|
-
|
149
|
-
|
150
|
-
|
151
|
-
|
152
|
-
|
160
|
+
requirement: &id010 !ruby/object:Gem::Requirement
|
161
|
+
none: false
|
162
|
+
requirements:
|
163
|
+
- - ~>
|
164
|
+
- !ruby/object:Gem::Version
|
165
|
+
hash: 63
|
166
|
+
segments:
|
167
|
+
- 0
|
168
|
+
- 10
|
169
|
+
- 4
|
170
|
+
version: 0.10.4
|
171
|
+
type: :development
|
172
|
+
version_requirements: *id010
|
153
173
|
description: SAML toolkit for Ruby on Rails
|
154
174
|
email: support@onelogin.com
|
155
175
|
executables: []
|
176
|
+
|
156
177
|
extensions: []
|
157
|
-
|
178
|
+
|
179
|
+
extra_rdoc_files:
|
158
180
|
- LICENSE
|
159
181
|
- README.md
|
160
|
-
files:
|
161
|
-
-
|
162
|
-
-
|
163
|
-
-
|
182
|
+
files:
|
183
|
+
- .document
|
184
|
+
- .gitignore
|
185
|
+
- .travis.yml
|
164
186
|
- Gemfile
|
165
187
|
- LICENSE
|
166
188
|
- README.md
|
@@ -255,6 +277,7 @@ files:
|
|
255
277
|
- test/responses/invalids/no_subjectconfirmation_method.xml.base64
|
256
278
|
- test/responses/invalids/response_encrypted_attrs.xml.base64
|
257
279
|
- test/responses/invalids/response_invalid_signed_element.xml.base64
|
280
|
+
- test/responses/invalids/signature_wrapping_attack.xml.base64
|
258
281
|
- test/responses/invalids/status_code_responder.xml.base64
|
259
282
|
- test/responses/invalids/status_code_responer_and_msg.xml.base64
|
260
283
|
- test/responses/no_signature_ns.xml
|
@@ -299,32 +322,43 @@ files:
|
|
299
322
|
- test/test_helper.rb
|
300
323
|
- test/utils_test.rb
|
301
324
|
- test/xml_security_test.rb
|
325
|
+
has_rdoc: true
|
302
326
|
homepage: http://github.com/onelogin/ruby-saml
|
303
|
-
licenses:
|
327
|
+
licenses:
|
304
328
|
- MIT
|
305
|
-
metadata: {}
|
306
329
|
post_install_message:
|
307
|
-
rdoc_options:
|
308
|
-
-
|
309
|
-
require_paths:
|
330
|
+
rdoc_options:
|
331
|
+
- --charset=UTF-8
|
332
|
+
require_paths:
|
310
333
|
- lib
|
311
|
-
required_ruby_version: !ruby/object:Gem::Requirement
|
312
|
-
|
334
|
+
required_ruby_version: !ruby/object:Gem::Requirement
|
335
|
+
none: false
|
336
|
+
requirements:
|
313
337
|
- - ">="
|
314
|
-
- !ruby/object:Gem::Version
|
338
|
+
- !ruby/object:Gem::Version
|
339
|
+
hash: 57
|
340
|
+
segments:
|
341
|
+
- 1
|
342
|
+
- 8
|
343
|
+
- 7
|
315
344
|
version: 1.8.7
|
316
|
-
required_rubygems_version: !ruby/object:Gem::Requirement
|
317
|
-
|
345
|
+
required_rubygems_version: !ruby/object:Gem::Requirement
|
346
|
+
none: false
|
347
|
+
requirements:
|
318
348
|
- - ">="
|
319
|
-
- !ruby/object:Gem::Version
|
320
|
-
|
349
|
+
- !ruby/object:Gem::Version
|
350
|
+
hash: 3
|
351
|
+
segments:
|
352
|
+
- 0
|
353
|
+
version: "0"
|
321
354
|
requirements: []
|
355
|
+
|
322
356
|
rubyforge_project: http://www.rubygems.org/gems/ruby-saml
|
323
|
-
rubygems_version:
|
357
|
+
rubygems_version: 1.3.7
|
324
358
|
signing_key:
|
325
|
-
specification_version:
|
359
|
+
specification_version: 3
|
326
360
|
summary: SAML Ruby Tookit
|
327
|
-
test_files:
|
361
|
+
test_files:
|
328
362
|
- test/certificates/certificate1
|
329
363
|
- test/certificates/certificate_without_head_foot
|
330
364
|
- test/certificates/formatted_certificate
|
@@ -380,6 +414,7 @@ test_files:
|
|
380
414
|
- test/responses/invalids/no_subjectconfirmation_method.xml.base64
|
381
415
|
- test/responses/invalids/response_encrypted_attrs.xml.base64
|
382
416
|
- test/responses/invalids/response_invalid_signed_element.xml.base64
|
417
|
+
- test/responses/invalids/signature_wrapping_attack.xml.base64
|
383
418
|
- test/responses/invalids/status_code_responder.xml.base64
|
384
419
|
- test/responses/invalids/status_code_responer_and_msg.xml.base64
|
385
420
|
- test/responses/no_signature_ns.xml
|
checksums.yaml
DELETED
@@ -1,7 +0,0 @@
|
|
1
|
-
---
|
2
|
-
SHA1:
|
3
|
-
metadata.gz: 6fb3836e492ba5fa2faa139d8985ff83e87fc8f4
|
4
|
-
data.tar.gz: 0fd231fd67a7a1bd5cfcf2e7413813e465b0fa54
|
5
|
-
SHA512:
|
6
|
-
metadata.gz: a931f544427ae080827ba9a21a2f14115ccd36588a5bd32cbf9017c6989b22878f8f21c87f8cd1c17451f67d8f162a2887b1f50810aba0806e33d15d0d1b61c5
|
7
|
-
data.tar.gz: 79639d6aa3edd230d080e24a3ce57bda7609ecb9ad460578b7a4ee79b9d904993918a7d5a68d94b1fea13566e625b0c3f386c2626354d658cac09fc5003f79f8
|