On Mon, 25 Jan 2021 at 17:15, Heather Flanagan
<hlflanagan at sphericalcowgroup.com> wrote:
>
> On Jan 25, 2021, 2:36 AM -0800, Leif Johansson <leifj at sunet.se>, wrote:
>
> Good answers. I don't think we should claim to provide a complete list of all
>
> software packages but there is no harm in saying that we know of several (list)
>
> and these were part of the initial notification process to prepare them for
>
> new relase
>
> We could also say that this is an open source library available via GitHub; we have no way of knowing all the deployments that use it. And perhaps we can take this as an opportunity to point people to https://idpy.org/security/.
>
OK, I am planning to send the final email later, today.
For the last question I will answer something along the lines of the
following (I welcome any other feedback):
> - 5. Finally, what other software/packages utilize pysaml2 ?
pysaml2 is an open source project and community effort. We have a page
dedicated to security on our website here https://idpy.org/security/
and we urge all users of our software to read it and subscribe to the
appropriate channels to stay up to date.
We do know of projects that use pysaml2 and members of some of those
projects are in direct communication with us, regarding issues and
features. Towards the wider community we gave a two-week notice that
an issue has been reported, asking everyone to prepare for an upgrade.
Throughout the project lifetime, a network of trusted community
members has grown organically, and those were given access to more
information and early patches to test and provide feedback.
Projects like SAtoSA, djangosaml2, UniAuth as well as software and
services based on pysaml2 managed by educational institutions and
research organizations, like eduTEAMS and InAcademia, were updated
swiftly and some were already running the patched version even before
it was released.
Cheers,
--
Ivan Kanakarakis
On Jan 25, 2021, 2:36 AM -0800, Leif Johansson <leifj at sunet.se>, wrote:
> On 2021-01-21 11:56, Ivan Kanakarakis wrote:
> > Hello,
> >
> > On Thu, 21 Jan 2021 at 11:17, Leif Johansson <leifj at sunet.se> wrote:
> > >
> > > On 2021-01-20 21:38, Ivan Kanakarakis wrote:
> > > > Hello everyone,
> > > >
> > > > I just received the following email with questions on the recent
> > > > vulnerabilities of pysaml2.
> > > > The news site is https://www.bleepingcomputer.com/
> > > >
> > > > Should we answer?
> > > > and should we answer all questions?
> > >
> > > I think we should answer but ask to see the writeup so you can help get the
> > > details right.
> > >
> >
> > This sounds like a better strategy. Below, I am answering the email
> > and questions to kickstart this process.
> > I am skeptical if we should answer the last question.
>
> Good answers. I don't think we should claim to provide a complete list of all
> software packages but there is no harm in saying that we know of several (list)
> and these were part of the initial notification process to prepare them for
> new relase
>
We could also say that this is an open source library available via GitHub; we have no way of knowing all the deployments that use it. And perhaps we can take this as an opportunity to point people to https://idpy.org/security/.
-Heather
Hello everyone,
I just received the following email with questions on the recent
vulnerabilities of pysaml2.
The news site is https://www.bleepingcomputer.com/
Should we answer?
and should we answer all questions?
Cheers,
PS: for those of you did not see our new page on the website, have a
look at the security section: https://idpy.org/security/
---------- Forwarded message ---------
From: Lawrence Abrams <labrams at bleepingcomputer.com>
Date: Wed, 20 Jan 2021 at 22:22
Subject: Press questions regarding the Pysaml2 vulnerability
To: <ivan.kanak at gmail.com>, <info at idpy.org>
I am a security reporter for the technology news site BleepingComputer.
In regards to your pysaml2 security advisory released today for
vulnerabilities CVE-2021-21238 and CVE-2021-21239.
1. Is it known if these vulnerabilities have been exploited in the
wild? If so, can you share how?
2. For CVE-2021-21238, would this allow an attacker to tamper a signed
file as long as the original legitimate signature is the first
keyvalue element?
3. For CVE-2021-21239, a signed document would be valid if the same
type of key is present in the document?
4. In what ways do you see these vulnerabilities being exploited and
are these critical enough that they should be updated immediately?
5. Finally, what other software/packages utilize pysaml2 ?
Thank you
Lawrence Abrams
BleepingComputer.com
--
Ivan c00kiemon5ter Kanakarakis >:3