Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Base64 newlines #18

Closed

Conversation

codekitchen
Copy link

No description provided.

Paul Hinze and others added 8 commits January 24, 2014 10:26
after verifying signatures, we build a list of "trusted roots" by walking
up to the elements referenced by the xml signatures. then we only query
against those trusted roots for details of the assertion.
because we have to use xmlSecAddIDs to get xmlsec to be able to
dereference signature references in SAML responses, a specially crafted
document with duplicate IDs can fool xmlsec into validating a signature
outside of the ancestry of the reference. this provides an attack vector
for injecting an unsigned assertion.

the solution is to catch the error thrown when xmlsec sees the duplicate
ID and immediately treat the response as invalid when this occurs.
@codekitchen
Copy link
Author

apparently this is the wrong branch :/

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
1 participant