On Breaking SAML: Be Whoever You Want to Be
This video is part of the Infosec Video Collection at SecurityTube.net: http://www.securitytube.net
On Breaking SAML: Be Whoever You Want to Be
Slide : - https://www.usenix.org/system/....files/conference/use https://www.usenix.org/system/....files/conference/use The Security Assertion Markup Language (SAML) is a widely adopted language for making security statements about subjects. It is a critical component for the development of federated identity deployments and Single Sign-On scenarios. In order to protect integrity and authenticity of the exchanged SAML assertions, the XML Signature standard is applied. However, the signature verification algorithm is much more complex than in traditional signature formats like PKCS#7. The integrity protection can thus be successfully circumvented by application of different XML Signature specific attacks, under a weak adversarial model.
In this paper we describe an in-depth analysis of 14 major SAML frameworks and show that 11 of them, including Salesforce, Shibboleth, and IBM XS40, have critical XML Signature wrapping (XSW) vulnerabilities. Based on our analysis, we developed an automated penetration testing tool for XSW in SAML frameworks. Its feasibility was proven by additional discovery of a new XSW variant. We propose the first framework to analyze such attacks, which is based on the information flow between two components of the Relying Party. Surprisingly, this analysis also yields efficient and practical countermeasures.
-
Category
Interesting video. I'm glad to join you. I often use online plagiarism checker https://plagiarismsearch.com/ for example. This allows me to save my time. Whenever I can check everything for plagiarism.