Releases: latchset/mod_auth_mellon
v0.19.1
v0.19.0
v0.18.1
What's Changed
- Logout endpoint should handle idP POST response by @batrla in #84
- mellon_create_metadata.sh: Fix compatibility with OpenSSL 3 by @kvisle in #106
- Add some clarification to the documentation by @jorgarga in #109
- Add encryption certificate to generated metadata by @zi0r in #112
New Contributors
- @batrla made their first contribution in #84
- @kvisle made their first contribution in #106
- @jorgarga made their first contribution in #109
- @zi0r made their first contribution in #112
Full Changelog: v0.18.0...v0.18.1
v0.18.0
Security fixes
- CVE-2021-3639 Redirect URL validation bypass - Version 0.17.0 and older of mod_auth_mellon allows the redirect URL validation to be bypassed by specifying an URL formatted as
///fishing-site.example.com/logout.html
. In this case, the browser would interpret the URL differently than the APR parsing utility mellon uses and redirect tofishing-site.example.com
. This could be reproduced with:
https://rp.example.co.jp/mellon/logout?ReturnTo=///fishing-site.example.com/logout.html
This version fixes that issue by rejecting all URLs that start with "///".
Enhancements
- A new option MellonSessionIdleTimeout that represents the amount of time a user can be inactive before the user's session times out in seconds.
Bug fixes
-
Several build-time fixes
-
The
CookieTest
SameSite
attribute was only set to None if mellon configure optionMellonCookieSameSite
was set to something other than default.
This is now fixed.
mod_auth_mellon 0.17.0
Enhancements:
-
New option MellonSendExpectHeader (default On) which allows to disable
sending the Expect header in the HTTP-Artifact binding to improve
performance when the remote party does not support this header. -
Set SameSite attribute to None on on the cookietest cookie.
-
Bump default generated keysize to 3072 bits in mellon_create_metadata.
Bug fixes:
-
Validate if the assertion ID has not been used earlier before creating
a new session. -
Release session cache after calling invalidate endpoint.
-
In MellonCond directives, fix a bug that setting the NC option would
also activate substring match and that REG would activate REF. -
Fix MellonCond substring match to actually match the substring on
the attribute value.
mod_auth_mellon v0.16.0
Enhancements
-
The MellonCookieSameSite option accepts a new valid "None". This is intended
to be used together with "MellonSecureCookie On". With some newer browsers,
only cookies with "SameSite=None; Secure" would be available for cross-site
access. -
A new option MellonEnabledInvalidateSessionEndpoint was added. When this
option is enabled, then a user can invalidate their session locally by
calling the "/invalidate" endpoint.
mod_auth_mellon v0.15.0
Security fixes
-
CVE-2019-13038 Redirect URL validation bypass - Version 0.14.1 and older of mod_auth_mellon allows the redirect URL validation to be bypassed by specifying an URL formatted as
http:www.hostname.com
. In this case, the APR parsing utility would parse the scheme as http, host as NULL and path aswww.hostname.com
. Browsers, however, interpret the URL differently and redirect towww.hostname.com
. This could be reproduced with:https://application.com/mellon/login?ReturnTo=http:www.hostname.com
This version fixes that issue by rejecting all URLs with scheme, but no host name.
Enhancements
- A XSLT script that allows converting attribute maps from Shibboleth to a set of
MellonSetEnvNoPrefix
entries was added. The script can be found atdoc/mellon-attribute-map.xsl
- A new configuration option
MellonEnvPrefix
was added. This option allows you to configure the variable prefix, which normally defaults toMELLON_
- A new configuration option
MellonAuthnContextComparisonType
was added. This option allows you to set theComparison
attribute within theAuthnRequest
Notable bug fixes:
- Compilation issues on Solaris were fixed