Skip to content

Commit 7c2ecc1

Browse files
committed
Set optional the XMLvalidation (enable/disable it with wantXMLValidation security setting
1 parent 1934fe9 commit 7c2ecc1

File tree

13 files changed

+206
-17
lines changed

13 files changed

+206
-17
lines changed

README.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -399,6 +399,10 @@ $advancedSettings = array (
399399
// Set true or don't present thi parameter and you will get an AuthContext 'exact' 'urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport'
400400
// Set an array with the possible auth context values: array ('urn:oasis:names:tc:SAML:2.0:ac:classes:Password', 'urn:oasis:names:tc:SAML:2.0:ac:classes:X509'),
401401
'requestedAuthnContext' => true,
402+
403+
// Indicates if the SP will validate all received xmls.
404+
// (In order to validate the xml, 'strict' and 'wantXMLValidation' must be true).
405+
'wantXMLValidation' => true,
402406
),
403407

404408
// Contact information template, it is recommended to suply a
@@ -503,7 +507,7 @@ define("TOOLKIT_PATH", '/var/www/php-saml/');
503507
require_once(TOOLKIT_PATH . '_toolkit_loader.php'); // We load the SAML2 lib
504508

505509
$auth = new OneLogin_Saml2_Auth(); // Constructor of the SP, loads settings.php
506-
// and advanced_settings.php
510+
// and advanced_settings.php
507511
$auth->login(); // Method that sent the AuthNRequest
508512
```
509513

advanced_settings_example.php

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -51,6 +51,10 @@
5151
// Set true or don't present thi parameter and you will get an AuthContext 'exact' 'urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport'
5252
// Set an array with the possible auth context values: array ('urn:oasis:names:tc:SAML:2.0:ac:classes:Password', 'urn:oasis:names:tc:SAML:2.0:ac:classes:X509'),
5353
'requestedAuthnContext' => true,
54+
55+
// Indicates if the SP will validate all received xmls.
56+
// (In order to validate the xml, 'strict' and 'wantXMLValidation' must be true).
57+
'wantXMLValidation' => true,
5458
),
5559

5660
// Contact information template, it is recommended to suply a technical and support contacts

lib/Saml2/LogoutRequest.php

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -262,14 +262,15 @@ public function isValid($retrieveParametersFromServer=false)
262262
$idPEntityId = $idpData['entityId'];
263263

264264
if ($this->_settings->isStrict()) {
265-
266-
$res = OneLogin_Saml2_Utils::validateXML($dom, 'saml-schema-protocol-2.0.xsd', $this->_settings->isDebugActive());
267-
if (!$res instanceof DOMDocument) {
268-
throw new Exception("Invalid SAML Logout Request. Not match the saml-schema-protocol-2.0.xsd");
269-
}
270-
271265
$security = $this->_settings->getSecurityData();
272266

267+
if ($security['wantXMLValidation']) {
268+
$res = OneLogin_Saml2_Utils::validateXML($dom, 'saml-schema-protocol-2.0.xsd', $this->_settings->isDebugActive());
269+
if (!$res instanceof DOMDocument) {
270+
throw new Exception("Invalid SAML Logout Request. Not match the saml-schema-protocol-2.0.xsd");
271+
}
272+
}
273+
273274
$currentURL = OneLogin_Saml2_Utils::getSelfRoutedURLNoQuery();
274275

275276
// Check NotOnOrAfter

lib/Saml2/LogoutResponse.php

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -101,14 +101,15 @@ public function isValid($requestId = null, $retrieveParametersFromServer=false)
101101
$idPEntityId = $idpData['entityId'];
102102

103103
if ($this->_settings->isStrict()) {
104+
$security = $this->_settings->getSecurityData();
104105

105-
$res = OneLogin_Saml2_Utils::validateXML($this->document, 'saml-schema-protocol-2.0.xsd', $this->_settings->isDebugActive());
106-
if (!$res instanceof DOMDocument) {
107-
throw new Exception("Invalid SAML Logout Response. Not match the saml-schema-protocol-2.0.xsd");
106+
if ($security['wantXMLValidation']) {
107+
$res = OneLogin_Saml2_Utils::validateXML($this->document, 'saml-schema-protocol-2.0.xsd', $this->_settings->isDebugActive());
108+
if (!$res instanceof DOMDocument) {
109+
throw new Exception("Invalid SAML Logout Response. Not match the saml-schema-protocol-2.0.xsd");
110+
}
108111
}
109112

110-
$security = $this->_settings->getSecurityData();
111-
112113
// Check if the InResponseTo of the Logout Response matchs the ID of the Logout Request (requestId) if provided
113114
if (isset($requestId) && $this->document->documentElement->hasAttribute('InResponseTo')) {
114115
$inResponseTo = $this->document->documentElement->getAttribute('InResponseTo');

lib/Saml2/Response.php

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -122,14 +122,15 @@ public function isValid($requestId = null)
122122
}
123123

124124
if ($this->_settings->isStrict()) {
125+
$security = $this->_settings->getSecurityData();
125126

126-
$res = OneLogin_Saml2_Utils::validateXML($this->document, 'saml-schema-protocol-2.0.xsd', $this->_settings->isDebugActive());
127-
if (!$res instanceof DOMDocument) {
128-
throw new Exception("Invalid SAML Response. Not match the saml-schema-protocol-2.0.xsd");
127+
if ($security['wantXMLValidation']) {
128+
$res = OneLogin_Saml2_Utils::validateXML($this->document, 'saml-schema-protocol-2.0.xsd', $this->_settings->isDebugActive());
129+
if (!$res instanceof DOMDocument) {
130+
throw new Exception("Invalid SAML Response. Not match the saml-schema-protocol-2.0.xsd");
131+
}
129132
}
130133

131-
$security = $this->_settings->getSecurityData();
132-
133134
$currentURL = OneLogin_Saml2_Utils::getSelfRoutedURLNoQuery();
134135

135136
if ($this->document->documentElement->hasAttribute('InResponseTo')) {

lib/Saml2/Settings.php

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -329,6 +329,13 @@ private function _addDefaultValues()
329329
$this->_security['wantNameIdEncrypted'] = false;
330330
}
331331

332+
// XML validation
333+
if (!isset($this->_security['wantXMLValidation'])) {
334+
$this->_security['wantXMLValidation'] = true;
335+
}
336+
337+
// Certificates / Private key /Fingerprint
338+
332339
if (!isset($this->_idp['x509cert'])) {
333340
$this->_idp['x509cert'] = '';
334341
}
Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
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
Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
PHNhbWxwOkxvZ291dFJlc3BvbnNlIHhtbG5zOnNhbWxwPSJ1cm46b2FzaXM6bmFtZXM6dGM6U0FNTDoyLjA6cHJvdG9jb2wiDQogICAgICAgICAgICAgICAgICAgICAgeG1sbnM6c2FtbD0idXJuOm9hc2lzOm5hbWVzOnRjOlNBTUw6Mi4wOmFzc2VydGlvbiINCiAgICAgICAgICAgICAgICAgICAgICBJRD0iX2Y5ZWU2MWJkOWRiZjYzNjA2ZmFhOWFlM2IxMDU0OGQ1YjM2NTZmYjg1OSINCiAgICAgICAgICAgICAgICAgICAgICBWZXJzaW9uPSIyLjAiDQogICAgICAgICAgICAgICAgICAgICAgSXNzdWVJbnN0YW50PSIyMDEzLTEyLTEwVDA0OjM5OjMxWiINCiAgICAgICAgICAgICAgICAgICAgICBEZXN0aW5hdGlvbj0iaHR0cDovL3N0dWZmLmNvbS9lbmRwb2ludHMvZW5kcG9pbnRzL3Nscy5waHAiDQogICAgICAgICAgICAgICAgICAgICAgSW5SZXNwb25zZVRvPSJPTkVMT0dJTl8yMTU4NGNjZGZhY2EzNmExNDVhZTk5MDQ0MmRjZDk2YmZlNjAxNTFlIg0KICAgICAgICAgICAgICAgICAgICAgID4NCiAgICA8c2FtbDpJc3N1ZXI+aHR0cDovL2lkcC5leGFtcGxlLmNvbS88L3NhbWw6SXNzdWVyPg0KICAgIDxzYW1sOklzc3Vlcj5odHRwOi8vaWRwMi5leGFtcGxlLmNvbS88L3NhbWw6SXNzdWVyPg0KICAgIDxzYW1scDpTdGF0dXM+DQogICAgICAgIDxzYW1scDpTdGF0dXNDb2RlIFZhbHVlPSJ1cm46b2FzaXM6bmFtZXM6dGM6U0FNTDoyLjA6c3RhdHVzOlN1Y2Nlc3MiIC8+DQogICAgPC9zYW1scDpTdGF0dXM+DQo8L3NhbWxwOkxvZ291dFJlc3BvbnNlPg==
Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
<samlp:Response xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol" xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion" ID="pfxe973f8ce-4c9c-4e8b-101c-bc9d0734ba09" Version="2.0" IssueInstant="2014-02-19T01:37:01Z" Destination="https://pitbulk.no-ip.org/newonelogin/demo1/index.php?acs" InResponseTo="ONELOGIN_5fe9d6e499b2f0913206aab3f7191729049bb807"><ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
  <ds:SignedInfo><ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
    <ds:SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1"/>
  <ds:Reference URI="#pfxe973f8ce-4c9c-4e8b-101c-bc9d0734ba09"><ds:Transforms><ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/><ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/></ds:Transforms><ds:DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/><ds:DigestValue>NIcukxjdaFkEi/jlPBum8AL6RS4=</ds:DigestValue></ds:Reference></ds:SignedInfo><ds:SignatureValue>cRzL1y0pB+oRLHm5bu+0VFC22YMtFb+p3asdbJAsQbRGvmfeh0B3H74eotq5YhPXlZ5poiIGNRPU4P1YFl3zK3vdyOr7akWtwERCTBnV2VFXRbcznW70GbUsDD9GYoi77kZkLFFer18Zxd4La0PH0DUFlAbqC6hhFhuXlXTsQeM=</ds:SignatureValue>
<ds:KeyInfo><ds:X509Data><ds:X509Certificate>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</ds:X509Certificate></ds:X509Data></ds:KeyInfo></ds:Signature><saml:Issuer>https://pitbulk.no-ip.org/simplesaml/saml2/idp/metadata.php</saml:Issuer><saml:Issuer>https://pitbulk.no-ip.org/simplesaml/saml2/idp/metadata2.php</saml:Issuer><samlp:Status><samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/></samlp:Status><saml:Assertion xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xs="http://www.w3.org/2001/XMLSchema" ID="pfxbe193488-366f-6297-a342-52ce9490ab63" Version="2.0" IssueInstant="2014-02-19T01:37:01Z"><saml:Issuer>https://pitbulk.no-ip.org/simplesaml/saml2/idp/metadata.php</saml:Issuer><ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
  <ds:SignedInfo><ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
    <ds:SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1"/>
  <ds:Reference URI="#pfxbe193488-366f-6297-a342-52ce9490ab63"><ds:Transforms><ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/><ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/></ds:Transforms><ds:DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/><ds:DigestValue>FqDQ4n1F+MAjjlaeX1708hkhLjo=</ds:DigestValue></ds:Reference></ds:SignedInfo><ds:SignatureValue>d/cSlO8OGdGgDEfeLtOOTpNQwe4a4iE9Ybg2GmRMh/OKB9YPnW00CmfxtwF4cmL1/wt4mimY7F5pJ35r1nsNRG00tQMnTjiC+ndTwPxktMtUJAUSTS7oEIFgk+AqqWhffny79KzRWcPrCW7TrDoa5PoXgj5XFM9F5FxLLei2YOo=</ds:SignatureValue>
<ds:KeyInfo><ds:X509Data><ds:X509Certificate>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</ds:X509Certificate></ds:X509Data></ds:KeyInfo></ds:Signature><saml:Subject><saml:NameID SPNameQualifier="https://pitbulk.no-ip.org/newonelogin/demo1/metadata.php" Format="urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress">492882615acf31c8096b627245d76ae53036c090</saml:NameID><saml:SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer"><saml:SubjectConfirmationData NotOnOrAfter="2023-08-23T06:57:01Z" Recipient="https://pitbulk.no-ip.org/newonelogin/demo1/index.php?acs" InResponseTo="ONELOGIN_5fe9d6e499b2f0913206aab3f7191729049bb807"/></saml:SubjectConfirmation></saml:Subject><saml:Conditions NotBefore="2014-02-19T01:36:31Z" NotOnOrAfter="2023-08-23T06:57:01Z"><saml:AudienceRestriction><saml:Audience>https://pitbulk.no-ip.org/newonelogin/demo1/metadata.php</saml:Audience></saml:AudienceRestriction></saml:Conditions><saml:AuthnStatement AuthnInstant="2014-02-19T01:37:01Z" SessionNotOnOrAfter="2014-02-19T09:37:01Z" SessionIndex="_6273d77b8cde0c333ec79d22a9fa0003b9fe2d75cb"><saml:AuthnContext><saml:AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:Password</saml:AuthnContextClassRef></saml:AuthnContext></saml:AuthnStatement><saml:AttributeStatement><saml:Attribute Name="uid" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xsi:type="xs:string">smartin</saml:AttributeValue></saml:Attribute><saml:Attribute Name="mail" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xsi:type="xs:string">smartin@yaco.es</saml:AttributeValue></saml:Attribute><saml:Attribute Name="cn" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xsi:type="xs:string">Sixto3</saml:AttributeValue></saml:Attribute><saml:Attribute Name="sn" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xsi:type="xs:string">Martin2</saml:AttributeValue></saml:Attribute><saml:Attribute Name="eduPersonAffiliation" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xsi:type="xs:string">user</saml:AttributeValue><saml:AttributeValue xsi:type="xs:string">admin</saml:AttributeValue></saml:Attribute></saml:AttributeStatement></saml:Assertion></samlp:Response>

tests/src/OneLogin/Saml2/LogoutRequestTest.php

Lines changed: 38 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -325,6 +325,44 @@ public function testIsInvalidIssuer()
325325
$this->assertContains('Invalid issuer in the Logout Request', $logoutRequest2->getError());
326326
}
327327

328+
/**
329+
* Tests the isValid method of the OneLogin_Saml2_LogoutRequest
330+
* Case invalid xml
331+
*
332+
* @covers OneLogin_Saml2_LogoutRequest::isValid
333+
*/
334+
public function testIsInValidWrongXML()
335+
{
336+
$settingsDir = TEST_ROOT .'/settings/';
337+
include $settingsDir.'settings1.php';
338+
339+
$settingsInfo['security']['wantXMLValidation'] = false;
340+
341+
$settings = new OneLogin_Saml2_Settings($settingsInfo);
342+
$settings->setStrict(false);
343+
344+
$message = file_get_contents(TEST_ROOT . '/data/logout_requests/invalids/invalid_xml.xml.base64');
345+
$response = new OneLogin_Saml2_LogoutRequest($settings, $message);
346+
347+
$this->assertTrue($response->isValid());
348+
349+
$settings->setStrict(true);
350+
$response2 = new OneLogin_Saml2_LogoutRequest($settings, $message);
351+
$response2->isValid();
352+
$this->assertNotEquals('Invalid SAML Logout Request. Not match the saml-schema-protocol-2.0.xsd', $response2->getError());
353+
354+
$settingsInfo['security']['wantXMLValidation'] = true;
355+
$settings2 = new OneLogin_Saml2_Settings($settingsInfo);
356+
$settings2->setStrict(false);
357+
$response3 = new OneLogin_Saml2_LogoutRequest($settings2, $message);
358+
$this->assertTrue($response3->isValid());
359+
360+
$settings2->setStrict(true);
361+
$response4 = new OneLogin_Saml2_LogoutRequest($settings2, $message);
362+
$this->assertFalse($response4->isValid());
363+
$this->assertEquals('Invalid SAML Logout Request. Not match the saml-schema-protocol-2.0.xsd', $response4->getError());
364+
}
365+
328366
/**
329367
* Tests the isValid method of the OneLogin_Saml2_LogoutRequest
330368
* Case Invalid Destination

0 commit comments

Comments
 (0)