Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
15.4.16 (08/23/24)
Security fix
[High] Stored XSS in SAML IdP
When registering a service provider with SAML IdP, Teleport did not sufficiently validate the ACS endpoint. This
could allow a Teleport administrator with permissions to write saml_idp_service_provider resources to configure
a malicious service provider with an XSS payload and compromise session of users who would access that
service provider.
Note: This vulnerability is only applicable when Teleport itself is acting as the identity provider. If you only use
SAML to connect to an upstream identity provider you are not impacted. You can use the tctl get
saml_idp_service_provider command to verify if you have any Service Provider applications registered and
Teleport acts as an IdP.
For self-hosted Teleport customers that use Teleport as SAML Identity Provider,
we recommend upgrading auth and proxy servers. Teleport agents (SSH, Kubernetes, desktop, application,
database and discovery) are not impacted and do not need to be updated.
Other fixes and improvements
tsh sessions ls
to make it easier to understand what sessions are ongoing and what sessions are user can/should join as a moderator. #45453teleport debug
commands incorrectly handling an unset data directory in the Teleport config. #45342Enterprise:
saml_idp_service_provider
resources can compromise the sessions of more powerful users and perform actions on behalf of others. #4863