1 SAML Attack Techniques
SAML (Security Assertion Markup Language) is used for SSO in enterprise environments. Its XML-based structure creates several unique attack vectors.
XML Signature Wrapping (XSW):
SAML responses are XML-signed. A wrapping attack duplicates the signed assertion and adds a malicious assertion. Vulnerable parsers process the signed (legitimate) assertion for signature verification but then use the malicious (unsigned) assertion for authorization.
<!-- Original signed assertion for user: [email protected] -->
<SAMLResponse>
<SignedAssertion>[email protected]...<Signature>...</Signature></SignedAssertion>
<!-- Injected malicious assertion (unsigned) -->
<Assertion>[email protected]...</Assertion>
</SAMLResponse>Comment injection attack:
<!-- Injected comment in username attribute -->
<NameID>admin<!--comment-->@attacker.com</NameID>
<!-- Some parsers strip comments before processing,
resulting in: [email protected] → "admin" -->