Descripción
An SQL injection vulnerability has been identified in the "ID" attribute of SAML response when replay cache Shibboleth Service Provider (SP) is configured to use an database as storage service. An unauthenticated attacker can exploit this issue via blind injection, allowing for extraction arbitrary data from database, if connection ODBC plugin. The arises insufficient escaping single quotes class SQLString (file odbc-store.cpp, lines 253-271).
This affects through 3.5.0.
https://r.sec-consult.com/shibboleth
https://shibboleth.net/community/advisories/secadv_20250903.txt
https://shibboleth.net/downloads/service-provider/3.5.1/