Shibboleth 2 XML Injection
Posted by deepcore on January 16, 2018 – 8:04 am
RedTeam Pentesting discovered that the shibd service of Shibboleth 2 does not extract SAML attribute values in a robust manner. By inserting XML entities into a SAML response, attackers may truncate attribute values without breaking the document’s signature. This might lead to a complete bypass of authorisation mechanisms. Versions prior to 2.6.1 are affected.
Post a reply
You must be logged in to post a comment.