1 SAML Attack Techniques
SAML (Security Assertion Markup Language) is used for SSO in enterprise environments. Its XML-based structure creates several unique attack vectors.
XML Signature Wrapping (XSW):
SAML responses are XML-signed. A wrapping attack duplicates the signed assertion and adds a malicious assertion. Vulnerable parsers process the signed (legitimate) assertion for signature verification but then use the malicious (unsigned) assertion for authorization.
<!-- Original signed assertion for user: user@corp.com -->
<SAMLResponse>
<SignedAssertion>...uid=user@corp.com...<Signature>...</Signature></SignedAssertion>
<!-- Injected malicious assertion (unsigned) -->
<Assertion>...uid=admin@corp.com...</Assertion>
</SAMLResponse>Comment injection attack:
<!-- Injected comment in username attribute -->
<NameID>admin<!--comment-->@attacker.com</NameID>
<!-- Some parsers strip comments before processing,
resulting in: admin@attacker.com → "admin" -->