diff --git a/SAML Injection/Images/XSLT1.jpg b/SAML Injection/Images/XSLT1.jpg new file mode 100644 index 0000000..6fe4dbf Binary files /dev/null and b/SAML Injection/Images/XSLT1.jpg differ diff --git a/SAML Injection/README.md b/SAML Injection/README.md index ad6ae16..928b56e 100644 --- a/SAML Injection/README.md +++ b/SAML Injection/README.md @@ -11,6 +11,7 @@ * [XML Signature Wrapping Attacks](#xml-signature-wrapping-attacks) * [XML Comment Handling](#xml-comment-handling) * [XML External Entity](#xml-external-entity) + * [Extensible Stylesheet Language Transformation](#extensible-stylesheet-language-transformation) ## Tools @@ -155,6 +156,34 @@ In the following example: The SAML response is accepted by the service provider. Due to the vulnerability, the service provider application reports "taf" as the value of the "uid" attribute. + +### Extensible Stylesheet Language Transformation + +An XSLT can be carried out by using the `transform` element. + +![http://sso-attacks.org/images/4/49/XSLT1.jpg](http://sso-attacks.org/images/4/49/XSLT1.jpg) +Picture from [http://sso-attacks.org/XSLT_Attack](http://sso-attacks.org/XSLT_Attack) + +```xml + + ... + + + + + + + + + + + + + + ... + +``` + ## References - [SAML Burp Extension - ROLAND BISCHOFBERGER - JULY 24, 2015](https://blog.compass-security.com/2015/07/saml-burp-extension/) @@ -165,4 +194,7 @@ The SAML response is accepted by the service provider. Due to the vulnerability, - [Vulnerability Note VU#475445 - 2018-02-27 - Carnegie Mellon University](https://www.kb.cert.org/vuls/id/475445/) - [ORACLE WEBLOGIC - MULTIPLE SAML VULNERABILITIES (CVE-2018-2998/CVE-2018-2933) - Denis Andzakovic - Jul 18, 2018](https://pulsesecurity.co.nz/advisories/WebLogic-SAML-Vulnerabilities) - [Truncation of SAML Attributes in Shibboleth 2 - 2018-01-15 - redteam-pentesting.de](https://www.redteam-pentesting.de/de/advisories/rt-sa-2017-013/-truncation-of-saml-attributes-in-shibboleth-2) -- [Attacking SSO: Common SAML Vulnerabilities and Ways to Find Them - March 7th, 2017 - Jem Jensen](https://blog.netspi.com/attacking-sso-common-saml-vulnerabilities-ways-find/) \ No newline at end of file +- [Attacking SSO: Common SAML Vulnerabilities and Ways to Find Them - March 7th, 2017 - Jem Jensen](https://blog.netspi.com/attacking-sso-common-saml-vulnerabilities-ways-find/) +- [How to Hunt Bugs in SAML; a Methodology - Part I - @epi052](https://epi052.gitlab.io/notes-to-self/blog/2019-03-07-how-to-test-saml-a-methodology/) +- [How to Hunt Bugs in SAML; a Methodology - Part II - @epi052](https://epi052.gitlab.io/notes-to-self/blog/2019-03-13-how-to-test-saml-a-methodology-part-two/) +- [How to Hunt Bugs in SAML; a Methodology - Part III - @epi052](https://epi052.gitlab.io/notes-to-self/blog/2019-03-16-how-to-test-saml-a-methodology-part-three/) \ No newline at end of file