-
Notifications
You must be signed in to change notification settings - Fork 79
Add New SAML Attack Based on parser differentials #93
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Hi @d0ge Of course. I am happy to review and test your implementations. Tobias |
Great! I will return shortly with the first implementation. |
Hi @tobiashort |
Hi @tobiashort |
Hi @d0ge I think all the previous work has paid out and it is nice to see how we can implement new checks and attacks with no to minor side effects on the other code. You said, you are not sure about the automatic time attributes update. I think if it is necessary that the exploit works as you say, then it is probably fine. I should have some time to test it until Monday evening if this is okay. Tobias |
I tested CVE-2025-25291 within a test environment with FusionAuth as an IdP. The exploit works well! Fixed a bug where the help description was not correctly displayed. |
Hi @tobiashort, |
Merged to master #94 |
Will create new Release v2.4.0 |
Uh oh!
There was an error while loading. Please reload this page.
Hi @tobiashort,
Hope you are doing well.
I’d like to propose implementing two new CVEs: CVE-2025-25291 and CVE-2025-25292. If you want to read more about vulnerabilities - write up is available here https://github.blog/security/sign-in-as-anyone-bypassing-saml-sso-authentication-with-parser-differentials/
Would you be interested in having this added to the SAMLRaider extension?
If so, I’m happy to handle the implementation. I can make a test environment similar to the previous one, so you can easily reproduce issue.
Looking forward to hearing your thoughts!
Cheers
The text was updated successfully, but these errors were encountered: