Skip to content

Commit e1d6b8d

Browse files
committed
Release 2.10.4
1 parent 2de73ac commit e1d6b8d

File tree

4 files changed

+16
-3
lines changed

4 files changed

+16
-3
lines changed

CHANGELOG

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,15 @@
11
CHANGELOG
22
=========
3+
v.2.10.4
4+
* [+](https://github.com/onelogin/php-saml/commit/949359f5cad5e1d085c4e5447d9aa8f49a6e82a1) Security update for signature validation on LogoutRequest/LogoutResponse
5+
* [#192](https://github.com/onelogin/php-saml/pull/192) Added ability to configure DigestAlgorithm in settings
6+
* [#183](https://github.com/onelogin/php-saml/pull/183) Fix strpos bug when decrypting assertions
7+
* [#186](https://github.com/onelogin/php-saml/pull/186) Improve info on entityId validation Exception
8+
* [#188](https://github.com/onelogin/php-saml/pull/188) Fixed issue with undefined constant of UNEXPECTED_SIGNED_ELEMENT
9+
* Read ACS binding on AuthNRequest builder from settings
10+
* Be able to relax Destination validation on SAMLResponses and let this
11+
attribute to be empty with the 'relaxDestinationValidation' setting
12+
313
v.2.10.3
414
* Implement a more specific exception class for handling some validation errors
515
* Minor changes on time validation/exceptions

README.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,9 @@ and supported by OneLogin Inc.
1010
Warning
1111
-------
1212

13+
Update php-saml to 2.10.4, this version includes a security patch related to
14+
[signature validations on LogoutRequests/LogoutResponses](https://github.com/onelogin/php-saml/commit/949359f5cad5e1d085c4e5447d9aa8f49a6e82a1)
15+
1316
Update php-saml to 2.10.0, this version includes a security patch that contains extra validations that will prevent signature wrapping attacks. [CVE-2016-1000253](https://github.com/distributedweaknessfiling/DWF-Database-Artifacts/blob/ab8ae6e845eb506fbeb10a7e4ccb379f0b4222ca/DWF/2016/1000253/CVE-2016-1000253.json)
1417

1518
php-saml < v2.10.0 is vulnerable and allows signature wrapping!

composer.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
"name": "onelogin/php-saml",
33
"description": "OneLogin PHP SAML Toolkit",
44
"license": "MIT",
5-
"version": "2.10.3",
5+
"version": "2.10.4",
66
"homepage": "https://onelogin.zendesk.com/hc/en-us/sections/200245634-SAML-Toolkits",
77
"keywords": ["saml", "saml2", "onelogin"],
88
"autoload": {

lib/Saml2/version.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{
22
"php-saml": {
3-
"version": "2.10.3",
4-
"released": "11/01/2017"
3+
"version": "2.10.4",
4+
"released": "28/02/2017"
55
}
66
}

0 commit comments

Comments
 (0)