Researchers find bug allowing hackers to bypass first factor authentication of users accounts

Found by Duo security in a third-party library in its own authentication gateway

Researchers uncovered a bug that could have allowed cyber crooks to bypass the first authentication step of user accounts protected by single sign-on (SSO).

Found by security company Duo, the firm discovered the implementation flaw in a third-party library in its own authentication gateway, Duo Network Gateway (DNG), late last year. After giving vendors time to fix the bug, it disclosed the problem responsibly. It's only now that the details of how worryingly effective the bug is have gone public.

Located in the open-source library 'python-saml' (CVE-2017-11427), the firm's researchers said that under certain configurations, the flaw could have allowed an attacker with authenticated access to a SAML Identity Provider (IdP) to bypass the first factor of authentication for a different user.

After a bit of digging, it was revealed that the flaw was reflected in many other SSO applications, thanks to a problem in handling the underlying "authentication language", something which has become a standard for products in this space.

"This issue is due to an inconsistency of XML DOM traversal APIs and their handling of comment nodes," Duo explained in a blog post. "Comment nodes should have no effect - and indeed, due to the canonicalisation of XML prior to signature verification, inserting an XML comment into a SAML message does not invalidate its signature."

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

However, the firm said the 'python-saml' code makes incorrect use of a DOM-traversal API, such that it fails to extract the full inner text of an XML element containing a comment. Instead, all the text after the comment is lost.

"To exploit this issue, an attacker inserts XML comments into select areas of the SAML assertions before passing them along to the DNG," the firm continued. "Once the DNG validates the signature and extracts the user's identifier, only part of the user's identifier is recovered."

Duo said that in cases where an attacker's user identifier (for example: john_doe) can be truncated to become a victim's user identifier (for example: john), the attacker can trick the DNG into authenticating as the victim.

Luckily, however, the issue has been resolved now through a patch to the Duo Network Gateway, and its public announcement has allowed other security firms to fix potentially similar issues in their authentication gateways.

Main image credit: Shutterstock 

Featured Resources

What you need to know about migrating to SAP S/4HANA

Factors to assess how and when to begin migration

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

Testing for compliance just became easier

How you can use technology to ensure compliance in your organisation

Download now

Best practices for implementing security awareness training

How to develop a security awareness programme that will actually change behaviour

Download now
Advertisement

Recommended

Visit/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome
internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019
Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/policy-legislation/data-governance/354496/brexit-security-talks-under-threat-after-uk-accused-of
data governance

Brexit security talks under threat after UK accused of illegally copying Schengen data

10 Jan 2020
Visit/web-browser/30394/what-is-http-error-503-and-how-do-you-fix-it
web browser

What is HTTP error 503 and how do you fix it?

7 Jan 2020
Visit/policy-legislation/data-protection/354492/currys-pc-world-parent-firm-hit-with-ps500k-fine-over
data protection

Currys PC World parent firm hit with £500k fine over historic data breach

9 Jan 2020
Visit/security/ransomware/354483/travelex-disruption-caused-by-devastating-ransomware-attack
ransomware

Travelex disruption caused by devastating ransomware attack

8 Jan 2020