CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE-16
ISO27001-A.14.2.5
OWASP 2013-A5
OWASP 2017-A6
WASC-15

SAML Response Signature Exclusion

Severity:
High
Summary

Invicti detected that the target application is vulnerable to SAML Response Signature Exclusion.

The web application uses SAML. The web application's SAML Consumer Service doesn't check a SAML Response signature when the Signature element is removed. An authenticated attacker may be able to use it to escalate privileges to a highly privileged user or to takeover accounts of other users in the application.

Impact

Account takeover and/or privilege escalation

Remediation

Change the configuration of the SAML service to require a valid signature for SAML Response.

Required Skills for Successful Exploitation
Actions To Take
Vulnerability Index

You can search and find all vulnerabilities

Featured resources

Blog

Strengthening enterprise application security: Invicti acquires Kondukto

Blog

Modern AppSec KPIs: Moving from scan counts to real risk reduction

Blog

Friends don’t let friends shift left: Shift smarter with DAST-first AppSec

Blog

Vibe talking: Dan Murphy on the promises, pitfalls, and insecurities of vibe coding

Blog

Strengthening enterprise application security: Invicti acquires Kondukto

Blog

Modern AppSec KPIs: Moving from scan counts to real risk reduction

Blog

Friends don’t let friends shift left: Shift smarter with DAST-first AppSec

Blog

Vibe talking: Dan Murphy on the promises, pitfalls, and insecurities of vibe coding