O365 auth bypass

Leif Johansson leifj at sunet.se
Thu Apr 28 07:56:12 EDT 2016



Skickat från min iPhone

> 28 apr. 2016 kl. 10:02 skrev Ioannis Kakavas <ikakavas at noc.grnet.gr>:
> 
> Hi Leif,
> 
> 
> There was a vulnerability in Office 365.
> I could send a "forged" SAML assertion and exploit it.
> I couldn't send a forged WS-Trust token and exploit it.
> I couldn't abuse the username/password authentication.
> 

Scotts point was that its all about key-to-name binding and not about saml at all. 

> The title was intended to reflect that. ( and yes I know that "the road
> to hell is paved with good intentions )
> 
> BR
> Ioannis
> 
> 
>> On 28/04/2016 10:48 πμ, Leif Johansson wrote:
>> 
>> 
>>>> 
>>>> This is being misrepresented (and >dangerously so, IMHO)
>>> 
>>> That's an overstatement IMHO.
>> 
>> Read the title out loud again and then say it isn't talking about SAML :-)
> 
> -- 
> ------------------------------------------------------------------
> Ioannis Kakavas - ikakavas at grnet.gr
> Identity and Security Engineer
> GRNET Network Operations Centre
> Greek Research & Technology Network - http://www.grnet.gr
> 56, Mesogion Av., Ampelokipi, 11527 Athens, Greece
> Office: +30 2107474255
> 
> PGP Fingerprint: A5AA FB5E 740A 603B FAB1 9920 D70F 0CD5 9DE3 C262
> ------------------------------------------------------------------
> 
> -- 
> To unsubscribe from this list send an email to users-unsubscribe at shibboleth.net


More information about the users mailing list