HomeVulnerabilitySamlify bug lets attackers bypass single sign-on

Samlify bug lets attackers bypass single sign-on

The attackers then insert a second, faux assertion–claiming to be an admin–into the already obtained, signed XML snippet. Owing to lax parsing guidelines in samlify variations previous to 2.10.0, the service supplier finally ends up processing the attacker’s faux, unsigned identification together with the unique signature.

Endor Labs researchers warned that this flaw opens the door to SAML SSO bypass and is straightforward to take advantage of because the “assault complexity is low”, “no privileges are required”, and “no consumer interplay is required”. Moreover, the requirement for acquiring a signed XML was famous as “reasonable”.

SAML authenticators ought to replace to patched variations

The flaw has been addressed by way of patches in samlify variations 2.10.0 and later.

See also  Russland knöpft sich Exil-Wodka vor
- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular