An authentication flaw in browser-based Single Sign-On protocols: Impact and remediations

被引:40
作者
Armando, Alessandro [1 ,2 ]
Carbone, Roberto [2 ]
Compagna, Luca [3 ]
Cuellar, Jorge [4 ]
Pellegrino, Giancarlo [3 ,6 ]
Sorniotti, Alessandro [5 ]
机构
[1] DIST U Genova, AI Lab, I-16145 Genoa, Italy
[2] FBK Irst, Secur & Trust Unit, I-38050 Trento, Italy
[3] SAP Labs France SAS, F-06254 Mougins, France
[4] Siemens AG, Corp Technol, D-80200 Munich, Germany
[5] IBM Res Zurich, CH-8803 Ruschlikon, Switzerland
[6] Inst Eurecom, F-06560 Sophia Antipolis, France
关键词
Single Sign-On; Security protocols; Model-checking; OpenID; SAML SSO; Vulnerability; Model-based security testing;
D O I
10.1016/j.cose.2012.08.007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Browser-based Single Sign-On (SSO) protocols relieve the user from the burden of dealing with multiple credentials thereby improving the user experience and the security. In this paper we show that extreme care is required for specifying and implementing the prototypical browser-based SSO use case. We show that the main emerging SSO protocols, namely SAML SSO and OpenID, suffer from an authentication flaw that allows a malicious service provider to hijack a client authentication attempt or force the latter to access a resource without its consent or intention. This may have serious Consequences, as evidenced by a Cross-Site Scripting attack that we have identified in the SAML-based SSO for Google Apps and in the SSO available in Novell Access Manager v.3.1. For instance, the attack allowed a malicious web server to impersonate a user on any Google application. We also describe solutions that can be used to mitigate and even solve the problem. (C) 2012 Elsevier Ltd. All rights reserved.
引用
收藏
页码:41 / 58
页数:18
相关论文
共 34 条
[1]  
[Anonymous], OPENID AUTH 2 0
[2]  
[Anonymous], OPENID US INT EXT 1
[3]  
[Anonymous], SAML VERS 2 0 ERR 05
[4]  
[Anonymous], OPENID SPEC
[5]  
[Anonymous], 15 ACM C COMP COMM S
[6]  
Armando A, 2004, LNAI, V3229
[7]  
Armando A, 2008, FMSE
[8]  
Armando A, 2009, APPL NON CLASS LOG, P403
[9]  
Armando A, 2012, LNCS IN PRESS
[10]  
Armando A, 2007, 20 IEEE COMP SEC FDN