Samlify Flaw Lets Hackers Bypass SSO as Admin Users
A critical vulnerability has been identified in Samlify, a SAML-based Single Sign-On (SSO) library, that enables attackers to bypass authentication and gain administrative access. The flaw allows malicious actors to inject unsigned assertions into otherwise valid SAML responses, effectively tricking the system into granting elevated privileges without proper verification.
The vulnerability stems from improper validation within the SAML response handling process. By crafting a malicious assertion and embedding it alongside a signed one, an attacker can impersonate an administrator and gain unauthorized access to sensitive systems or data. The issue highlights a fundamental security lapse in how Samlify processes authentication assertions.
Security teams relying on Samlify for SSO integration are urged to review their implementations and apply any necessary patches or mitigations. The incident underscores the importance of strict validation of all components in authentication mechanisms, particularly in environments where SSO is used to manage high-level user permissions across multiple services.
