O365 auth bypass
Leif Johansson
leifj at sunet.se
Thu Apr 28 07:56:12 EDT 2016
Skickat från min iPhone
> 28 apr. 2016 kl. 10:02 skrev Ioannis Kakavas <ikakavas at noc.grnet.gr>:
>
> Hi Leif,
>
>
> There was a vulnerability in Office 365.
> I could send a "forged" SAML assertion and exploit it.
> I couldn't send a forged WS-Trust token and exploit it.
> I couldn't abuse the username/password authentication.
>
Scotts point was that its all about key-to-name binding and not about saml at all.
> The title was intended to reflect that. ( and yes I know that "the road
> to hell is paved with good intentions )
>
> BR
> Ioannis
>
>
>> On 28/04/2016 10:48 πμ, Leif Johansson wrote:
>>
>>
>>>>
>>>> This is being misrepresented (and >dangerously so, IMHO)
>>>
>>> That's an overstatement IMHO.
>>
>> Read the title out loud again and then say it isn't talking about SAML :-)
>
> --
> ------------------------------------------------------------------
> Ioannis Kakavas - ikakavas at grnet.gr
> Identity and Security Engineer
> GRNET Network Operations Centre
> Greek Research & Technology Network - http://www.grnet.gr
> 56, Mesogion Av., Ampelokipi, 11527 Athens, Greece
> Office: +30 2107474255
>
> PGP Fingerprint: A5AA FB5E 740A 603B FAB1 9920 D70F 0CD5 9DE3 C262
> ------------------------------------------------------------------
>
> --
> To unsubscribe from this list send an email to users-unsubscribe at shibboleth.net
More information about the users
mailing list