You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Version 3.4.0 introduces the 'rejectUnsolicitedResponsesWithInResponseTo' setting parameter, by default disabled, that will allow invalidate unsolicited SAMLResponse. This version as well will reject SAMLResponse if requestId was provided to the validator but the SAMLResponse does not contain a InResponseTo attribute. And an additional setting parameter 'destinationStrictlyMatches', by default disabled, that will force that the Destination URL should strictly match to the address that process the SAMLResponse.
14
-
15
-
Version 3.3.1 updates xmlseclibs to 3.0.4 (CVE-2019-3465), but php-saml was not directly affected since it implements additional checks that prevent to exploit that vulnerability.
16
-
17
-
Version 3.3.0 sets strict mode active by default
18
-
19
-
Update php-saml to 3.1.0, this version includes a security patch related to XEE attacks.
20
-
21
-
This version is compatible with PHP 7.X and does not include xmlseclibs (you will need to install it via composer, dependency described in composer.json)
13
+
This version is compatible with PHP >7.1 and 8.X and does not include xmlseclibs (you will need to install it via composer, dependency described in composer.json)
22
14
23
15
Security Guidelines
24
16
-------------------
@@ -132,7 +124,9 @@ Your settings are at risk of being deleted when updating packages using `compose
132
124
Compatibility
133
125
-------------
134
126
135
-
This 3.X.X supports PHP 7.X. but can be used with PHP >=5.4 as well (5.6.24+ recommended for security reasons).
127
+
This 4.X.X supports PHP >7.1 .
128
+
129
+
It is not compatible with PHP5.6 or PHP7.0.
136
130
137
131
Namespaces
138
132
----------
@@ -513,6 +507,17 @@ $advancedSettings = array(
513
507
// Notice that sha1 is a deprecated algorithm and should not be used
0 commit comments