Advertisement

Samlify bug lets attackers bypass single sign-on



Thank you for reading this post, don't forget to subscribe!

The attackers then insert a second, faux assertion–claiming to be an admin–into the already obtained, signed XML snippet. Owing to lax parsing guidelines in samlify variations previous to 2.10.0, the service supplier finally ends up processing the attacker’s faux, unsigned id together with the unique signature.

Endor Labs researchers warned that this flaw opens the door to SAML SSO bypass and is simple to take advantage of because the “assault complexity is low”, “no privileges are required”, and “no consumer interplay is required”. Moreover, the requirement for acquiring a signed XML was famous as “lifelike”.

SAML authenticators ought to replace to patched variations

The flaw has been addressed by means of patches in samlify variations 2.10.0 and later.