Shib IDP v3 integration with Cylance

Cantor, Scott cantor.2 at osu.edu
Tue Mar 20 09:17:26 EDT 2018


> Are there tools or test scripts for the various known XML parsing
> vulnerabilities?

It doesn't lend itself to that, you have to know what you're trying to do with the payload to impersonate the vitcim.

>  Scott, how do you test an SP to see if it is vulnerable?

Duo provided clear examples of inserting comments into the XML, there's nothing else to it.

>  If you give the vendor a "repeat-by" procedure then they may be more responsive.

I have, many times. And I shouldn't have to, Duo did that for me. The attack was so widespread and so easy to do that they really had no choice but to document the specifics.

> I recently saw the report of the simplesamlphp XML vulnerabilities which are
> completely different than the xmltooling library issues.

That isn't the problem we're going to be dealing with, that's a simple matter of patching a known implementation. The problem is all the unknown and half-constructed ones.

-- Scott



More information about the users mailing list