Skip to content

Commit

Permalink
Add explicit tests for XSW (crewjam#338)
Browse files Browse the repository at this point in the history
XML Signature Wrapping attacks are unfortunately still very common
in SAML implementations. crewjam/saml is not vulnerable to any XSW
attacks as goxmldsig and this library's use of goxmldsig are safe.

This commit adds a number of tests against common XSW attacks, so
that these can serve as verification of the current safe state,
prevent future regressions in crewjam/saml and detect possible
future regressions in goxmldsig

The numbering of the permutations of the XSW attack follows that
of https://github.com/CompassSecurity/SAMLRaider and a visual
depiction is available in
https://github.com/CompassSecurity/SAMLRaider/blob/5b9eace70e88d0af17b86c26c2cad1178b08c7d0/src/main/resources/xswlist.png
  • Loading branch information
jkakavas authored Mar 25, 2021
1 parent 0301c03 commit 83bd6bf
Show file tree
Hide file tree
Showing 10 changed files with 266 additions and 0 deletions.
257 changes: 257 additions & 0 deletions service_provider_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -1231,6 +1231,263 @@ func TestSPInvalidAssertions(t *testing.T) {
assert.Check(t, err)
}

func TestXswPermutationOneIsRejected(t *testing.T) {
test := NewServiceProviderTest(t)
idpMetadata := golden.Get(t, "TestSPCanHandleOneloginResponse_IDPMetadata")
respStr := golden.Get(t, "TestXswPermutationOneIsRejected_response")
TimeNow = func() time.Time {
rv, _ := time.Parse("Mon Jan 2 15:04:05 UTC 2006", "Tue Jan 5 17:53:12 UTC 2016")
return rv
}
Clock = dsig.NewFakeClockAt(TimeNow())

s := ServiceProvider{
Key: test.Key,
Certificate: test.Certificate,
MetadataURL: mustParseURL("https://29ee6d2e.ngrok.io/saml/metadata"),
AcsURL: mustParseURL("https://29ee6d2e.ngrok.io/saml/acs"),
IDPMetadata: &EntityDescriptor{},
}
err := xml.Unmarshal(idpMetadata, &s.IDPMetadata)
assert.Check(t, err)

req := http.Request{PostForm: url.Values{}}
req.PostForm.Set("SAMLResponse", string(respStr))
_, err = s.ParseResponse(&req, []string{"id-d40c15c104b52691eccf0a2a5c8a15595be75423"})
assert.Check(t, is.Error(err.(*InvalidResponseError).PrivateErr,
"cannot validate signature on Response: Missing signature referencing the top-level element"))
}

func TestXswPermutationTwoIsRejected(t *testing.T) {
test := NewServiceProviderTest(t)
idpMetadata := golden.Get(t, "TestSPCanHandleOneloginResponse_IDPMetadata")
respStr := golden.Get(t, "TestXswPermutationTwoIsRejected_response")
TimeNow = func() time.Time {
rv, _ := time.Parse("Mon Jan 2 15:04:05 UTC 2006", "Tue Jan 5 17:53:12 UTC 2016")
return rv
}
Clock = dsig.NewFakeClockAt(TimeNow())

s := ServiceProvider{
Key: test.Key,
Certificate: test.Certificate,
MetadataURL: mustParseURL("https://29ee6d2e.ngrok.io/saml/metadata"),
AcsURL: mustParseURL("https://29ee6d2e.ngrok.io/saml/acs"),
IDPMetadata: &EntityDescriptor{},
}
err := xml.Unmarshal(idpMetadata, &s.IDPMetadata)
assert.Check(t, err)

req := http.Request{PostForm: url.Values{}}
req.PostForm.Set("SAMLResponse", string(respStr))
_, err = s.ParseResponse(&req, []string{"id-d40c15c104b52691eccf0a2a5c8a15595be75423"})
assert.Check(t, is.Error(err.(*InvalidResponseError).PrivateErr,
"cannot validate signature on Response: Missing signature referencing the top-level element"))
}

func TestXswPermutationThreeIsRejected(t *testing.T) {
test := NewServiceProviderTest(t)
idpMetadata := golden.Get(t, "TestServiceProviderCanHandleSignedAssertionsResponse_IDPMetadata")
respStr := golden.Get(t, "TestXswPermutationThreeIsRejected_response")
TimeNow = func() time.Time {
rv, _ := time.Parse(timeFormat, "2014-07-17T01:02:59Z")
return rv
}
Clock = dsig.NewFakeClockAt(TimeNow())

s := ServiceProvider{
Key: test.Key,
Certificate: test.Certificate,
MetadataURL: mustParseURL("http://sp.example.com/demo1/metadata.php"),
AcsURL: mustParseURL("http://sp.example.com/demo1/index.php?acs"),
IDPMetadata: &EntityDescriptor{},
}
err := xml.Unmarshal(idpMetadata, &s.IDPMetadata)
assert.Check(t, err)

req := http.Request{PostForm: url.Values{}}
req.PostForm.Set("SAMLResponse", string(respStr))
_, err = s.ParseResponse(&req, []string{"ONELOGIN_4fee3b046395c4e751011e97f8900b5273d56685"})
// Because this permutation contains an unsigned assertion as child of the response
assert.Check(t, is.Error(err.(*InvalidResponseError).PrivateErr,
"either the Response or Assertion must be signed"))
}

func TestXswPermutationFourIsRejected(t *testing.T) {
test := NewServiceProviderTest(t)
idpMetadata := golden.Get(t, "TestServiceProviderCanHandleSignedAssertionsResponse_IDPMetadata")
respStr := golden.Get(t, "TestXswPermutationFourIsRejected_response")
TimeNow = func() time.Time {
rv, _ := time.Parse(timeFormat, "2014-07-17T01:02:59Z")
return rv
}
Clock = dsig.NewFakeClockAt(TimeNow())

s := ServiceProvider{
Key: test.Key,
Certificate: test.Certificate,
MetadataURL: mustParseURL("http://sp.example.com/demo1/metadata.php"),
AcsURL: mustParseURL("http://sp.example.com/demo1/index.php?acs"),
IDPMetadata: &EntityDescriptor{},
}
err := xml.Unmarshal(idpMetadata, &s.IDPMetadata)
assert.Check(t, err)

req := http.Request{PostForm: url.Values{}}
req.PostForm.Set("SAMLResponse", string(respStr))
_, err = s.ParseResponse(&req, []string{"ONELOGIN_4fee3b046395c4e751011e97f8900b5273d56685"})
// Because this permutation contains an unsigned assertion as child of the response
assert.Check(t, is.Error(err.(*InvalidResponseError).PrivateErr,
"either the Response or Assertion must be signed"))
}

func TestXswPermutationFiveIsRejected(t *testing.T) {
test := NewServiceProviderTest(t)
idpMetadata := golden.Get(t, "TestServiceProviderCanHandleSignedAssertionsResponse_IDPMetadata")
respStr := golden.Get(t, "TestXswPermutationFiveIsRejected_response")
TimeNow = func() time.Time {
rv, _ := time.Parse(timeFormat, "2014-07-17T01:02:59Z")
return rv
}
Clock = dsig.NewFakeClockAt(TimeNow())

s := ServiceProvider{
Key: test.Key,
Certificate: test.Certificate,
MetadataURL: mustParseURL("http://sp.example.com/demo1/metadata.php"),
AcsURL: mustParseURL("http://sp.example.com/demo1/index.php?acs"),
IDPMetadata: &EntityDescriptor{},
}
err := xml.Unmarshal(idpMetadata, &s.IDPMetadata)
assert.Check(t, err)

req := http.Request{PostForm: url.Values{}}
req.PostForm.Set("SAMLResponse", string(respStr))
_, err = s.ParseResponse(&req, []string{"ONELOGIN_4fee3b046395c4e751011e97f8900b5273d56685"})
assert.Check(t, is.Error(err.(*InvalidResponseError).PrivateErr,
"cannot validate signature on Response: Missing signature referencing the top-level element"))
}

func TestXswPermutationSixIsRejected(t *testing.T) {
test := NewServiceProviderTest(t)
idpMetadata := golden.Get(t, "TestServiceProviderCanHandleSignedAssertionsResponse_IDPMetadata")
respStr := golden.Get(t, "TestXswPermutationSixIsRejected_response")
TimeNow = func() time.Time {
rv, _ := time.Parse(timeFormat, "2014-07-17T01:02:59Z")
return rv
}
Clock = dsig.NewFakeClockAt(TimeNow())

s := ServiceProvider{
Key: test.Key,
Certificate: test.Certificate,
MetadataURL: mustParseURL("http://sp.example.com/demo1/metadata.php"),
AcsURL: mustParseURL("http://sp.example.com/demo1/index.php?acs"),
IDPMetadata: &EntityDescriptor{},
}
err := xml.Unmarshal(idpMetadata, &s.IDPMetadata)
assert.Check(t, err)

req := http.Request{PostForm: url.Values{}}
req.PostForm.Set("SAMLResponse", string(respStr))
_, err = s.ParseResponse(&req, []string{"ONELOGIN_4fee3b046395c4e751011e97f8900b5273d56685"})
assert.Check(t, is.Error(err.(*InvalidResponseError).PrivateErr,
"cannot validate signature on Response: Missing signature referencing the top-level element"))
}

func TestXswPermutationSevenIsRejected(t *testing.T) {
test := NewServiceProviderTest(t)
idpMetadata := golden.Get(t, "TestServiceProviderCanHandleSignedAssertionsResponse_IDPMetadata")
respStr := golden.Get(t, "TestXswPermutationSevenIsRejected_response")
TimeNow = func() time.Time {
rv, _ := time.Parse(timeFormat, "2014-07-17T01:02:59Z")
return rv
}
Clock = dsig.NewFakeClockAt(func() time.Time {
rv, _ := time.Parse(timeFormat, "2014-07-17T14:12:57Z")
return rv
}())

s := ServiceProvider{
Key: test.Key,
Certificate: test.Certificate,
MetadataURL: mustParseURL("http://sp.example.com/demo1/metadata.php"),
AcsURL: mustParseURL("http://sp.example.com/demo1/index.php?acs"),
IDPMetadata: &EntityDescriptor{},
}
err := xml.Unmarshal(idpMetadata, &s.IDPMetadata)
assert.Check(t, err)

req := http.Request{PostForm: url.Values{}}
req.PostForm.Set("SAMLResponse", string(respStr))
_, err = s.ParseResponse(&req, []string{"ONELOGIN_4fee3b046395c4e751011e97f8900b5273d56685"})
//It's the assertion signature that can't be verified. The error message is generic and always mentions Response
assert.Check(t, is.Error(err.(*InvalidResponseError).PrivateErr,
"cannot validate signature on Response: Signature could not be verified"))
}

func TestXswPermutationEightIsRejected(t *testing.T) {
test := NewServiceProviderTest(t)
idpMetadata := golden.Get(t, "TestServiceProviderCanHandleSignedAssertionsResponse_IDPMetadata")
respStr := golden.Get(t, "TestXswPermutationEightIsRejected_response")
TimeNow = func() time.Time {
rv, _ := time.Parse(timeFormat, "2014-07-17T01:02:59Z")
return rv
}
Clock = dsig.NewFakeClockAt(func() time.Time {
rv, _ := time.Parse(timeFormat, "2014-07-17T14:12:57Z")
return rv
}())

s := ServiceProvider{
Key: test.Key,
Certificate: test.Certificate,
MetadataURL: mustParseURL("http://sp.example.com/demo1/metadata.php"),
AcsURL: mustParseURL("http://sp.example.com/demo1/index.php?acs"),
IDPMetadata: &EntityDescriptor{},
}
err := xml.Unmarshal(idpMetadata, &s.IDPMetadata)
assert.Check(t, err)

req := http.Request{PostForm: url.Values{}}
req.PostForm.Set("SAMLResponse", string(respStr))
_, err = s.ParseResponse(&req, []string{"ONELOGIN_4fee3b046395c4e751011e97f8900b5273d56685"})
//It's the assertion signature that can't be verified. The error message is generic and always mentions Response
assert.Check(t, is.Error(err.(*InvalidResponseError).PrivateErr,
"cannot validate signature on Response: Signature could not be verified"))
}

func TestXswPermutationNineIsRejected(t *testing.T) {
test := NewServiceProviderTest(t)
idpMetadata := golden.Get(t, "TestServiceProviderCanHandleSignedAssertionsResponse_IDPMetadata")
respStr := golden.Get(t, "TestXswPermutationNineIsRejected_response")
TimeNow = func() time.Time {
rv, _ := time.Parse(timeFormat, "2014-07-17T01:02:59Z")
return rv
}
Clock = dsig.NewFakeClockAt(func() time.Time {
rv, _ := time.Parse(timeFormat, "2014-07-17T14:12:57Z")
return rv
}())

s := ServiceProvider{
Key: test.Key,
Certificate: test.Certificate,
MetadataURL: mustParseURL("http://sp.example.com/demo1/metadata.php"),
AcsURL: mustParseURL("http://sp.example.com/demo1/index.php?acs"),
IDPMetadata: &EntityDescriptor{},
}
err := xml.Unmarshal(idpMetadata, &s.IDPMetadata)
assert.Check(t, err)

req := http.Request{PostForm: url.Values{}}
req.PostForm.Set("SAMLResponse", string(respStr))
_, err = s.ParseResponse(&req, []string{"ONELOGIN_4fee3b046395c4e751011e97f8900b5273d56685"})
//It's the assertion signature that can't be verified. The error message is generic and always mentions Response
assert.Check(t, is.Error(err.(*InvalidResponseError).PrivateErr,
"cannot validate signature on Response: Missing signature referencing the top-level element"))
}

func TestSPRealWorldKeyInfoHasRSAPublicKeyNotX509Cert(t *testing.T) {
// This is a real world SAML response that we observed. It contains <ds:RSAKeyValue> elements
idpMetadata := golden.Get(t, "TestSPRealWorldKeyInfoHasRSAPublicKeyNotX509Cert_idp_metadata")
Expand Down
1 change: 1 addition & 0 deletions testdata/TestXswPermutationEightIsRejected_response
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
<?xml version="1.0" encoding="UTF-8"?>
<samlp:Response xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion" xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol" Destination="http://sp.example.com/demo1/index.php?acs" ID="_8e8dc5f69a98cc4c1ff3427e5ce34606fd672f91e6" InResponseTo="ONELOGIN_4fee3b046395c4e751011e97f8900b5273d56685" IssueInstant="2014-07-17T01:01:48Z" Version="2.0"><saml:Issuer>http://idp.example.com/metadata.php</saml:Issuer><samlp:Status><samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/></samlp:Status><saml:Assertion xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" ID="pfx046900c5-0423-35cb-2adb-72283ba5d8cd" IssueInstant="2014-07-17T01:01:48Z" Version="2.0"><saml:Issuer>http://idp.example.com/metadata.php</saml:Issuer><ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#"><ds:SignedInfo><ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/><ds:SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1"/><ds:Reference URI="#pfx046900c5-0423-35cb-2adb-72283ba5d8cd"><ds:Transforms><ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/><ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/></ds:Transforms><ds:DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/><ds:DigestValue>beyfqH9s1S+6l2GBHbSlW8TxK6E=</ds:DigestValue></ds:Reference></ds:SignedInfo><ds:SignatureValue>CJBLcJUNouCJlcwyaKSoTFtrTaRNQbgXrEQGJNflv2djLt3rtwi+G6LwuPfD+rAyoyHmqrQySiRZgYMycunO/5D6GbyeXIV3ksOwcF+AyVdkknUiqSwH7/9rdvEafkJp47wZX+78vQF06Mr1g4Jl80rNcDRw1xOEuoP7jC25m1Q=</ds:SignatureValue><ds:KeyInfo><ds:X509Data><ds:X509Certificate>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</ds:X509Certificate></ds:X509Data></ds:KeyInfo><Object><saml:Assertion xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" ID="pfx046900c5-0423-35cb-2adb-72283ba5d8cd" IssueInstant="2014-07-17T01:01:48Z" Version="2.0"><saml:Issuer>http://idp.example.com/metadata.php</saml:Issuer><saml:Subject><saml:NameID Format="urn:oasis:names:tc:SAML:2.0:nameid-format:transient" SPNameQualifier="http://sp.example.com/demo1/metadata.php">_ce3d2948b4cf20146dee0a0b3dd6f69b6cf86f62d7</saml:NameID><saml:SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer"><saml:SubjectConfirmationData InResponseTo="ONELOGIN_4fee3b046395c4e751011e97f8900b5273d56685" NotOnOrAfter="2024-01-18T06:21:48Z" Recipient="http://sp.example.com/demo1/index.php?acs"/></saml:SubjectConfirmation></saml:Subject><saml:Conditions NotBefore="2014-07-17T01:01:18Z" NotOnOrAfter="2024-01-18T06:21:48Z"><saml:AudienceRestriction><saml:Audience>http://sp.example.com/demo1/metadata.php</saml:Audience></saml:AudienceRestriction></saml:Conditions><saml:AuthnStatement AuthnInstant="2014-07-17T01:01:48Z" SessionIndex="_be9967abd904ddcae3c0eb4189adbe3f71e327cf93" SessionNotOnOrAfter="2024-07-17T09:01:48Z"><saml:AuthnContext><saml:AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:Password</saml:AuthnContextClassRef></saml:AuthnContext></saml:AuthnStatement><saml:AttributeStatement><saml:Attribute Name="uid" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xsi:type="xs:string">test</saml:AttributeValue></saml:Attribute><saml:Attribute Name="mail" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xsi:type="xs:string">test@example.com</saml:AttributeValue></saml:Attribute><saml:Attribute Name="eduPersonAffiliation" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xsi:type="xs:string">users</saml:AttributeValue><saml:AttributeValue xsi:type="xs:string">examplerole1</saml:AttributeValue></saml:Attribute></saml:AttributeStatement></saml:Assertion></Object></ds:Signature><saml:Subject><saml:NameID Format="urn:oasis:names:tc:SAML:2.0:nameid-format:transient" SPNameQualifier="http://sp.example.com/demo1/metadata.php">_ce3d2948b4cf20146dee0a0b3dd6f69b6cf86f62d7</saml:NameID><saml:SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer"><saml:SubjectConfirmationData InResponseTo="ONELOGIN_4fee3b046395c4e751011e97f8900b5273d56685" NotOnOrAfter="2024-01-18T06:21:48Z" Recipient="http://sp.example.com/demo1/index.php?acs"/></saml:SubjectConfirmation></saml:Subject><saml:Conditions NotBefore="2014-07-17T01:01:18Z" NotOnOrAfter="2024-01-18T06:21:48Z"><saml:AudienceRestriction><saml:Audience>http://sp.example.com/demo1/metadata.php</saml:Audience></saml:AudienceRestriction></saml:Conditions><saml:AuthnStatement AuthnInstant="2014-07-17T01:01:48Z" SessionIndex="_be9967abd904ddcae3c0eb4189adbe3f71e327cf93" SessionNotOnOrAfter="2024-07-17T09:01:48Z"><saml:AuthnContext><saml:AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:Password</saml:AuthnContextClassRef></saml:AuthnContext></saml:AuthnStatement><saml:AttributeStatement><saml:Attribute Name="uid" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xsi:type="xs:string">test</saml:AttributeValue></saml:Attribute><saml:Attribute Name="mail" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xsi:type="xs:string">test@example.com</saml:AttributeValue></saml:Attribute><saml:Attribute Name="eduPersonAffiliation" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xsi:type="xs:string">users</saml:AttributeValue><saml:AttributeValue xsi:type="xs:string">examplerole1</saml:AttributeValue></saml:Attribute></saml:AttributeStatement></saml:Assertion></samlp:Response>

Loading

0 comments on commit 83bd6bf

Please sign in to comment.