<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Signature-Bypass — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/signature-bypass/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 29 Apr 2026 21:56:13 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/signature-bypass/feed.xml" rel="self" type="application/rss+xml"/><item><title>Admidio SAML Signature Validation Bypass Allows Forged AuthnRequests and LogoutRequests</title><link>https://feed.craftedsignal.io/briefs/2026-04-admidio-saml-bypass/</link><pubDate>Wed, 29 Apr 2026 21:56:13 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-admidio-saml-bypass/</guid><description>Admidio's SAML Identity Provider implementation fails to properly validate signatures on SAML AuthnRequests and LogoutRequests, enabling attackers to bypass signature enforcement, potentially disclose user attributes via forged SSO requests, and terminate user sessions via forged SLO requests.</description><content:encoded><![CDATA[<p>Admidio, a free web-based content management system for organizations and groups, contains a critical vulnerability in its SAML Single Sign-On (SSO) implementation. The <code>validateSignature()</code> method within the SAMLService class returns error strings upon signature validation failure, rather than throwing exceptions. The calling functions, <code>handleSSORequest()</code> and <code>handleSLORequest()</code>, incorrectly assume that the method throws an exception, and therefore, do not check the return value. This oversight renders the <code>smc_require_auth_signed</code> configuration option ineffective, allowing attackers to forge SAML AuthnRequests and LogoutRequests. An attacker can exploit this vulnerability to obtain sensitive user information or cause denial of service by terminating user sessions. This affects Admidio versions 5.0.8 and earlier and requires SAML SSO to be enabled.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious SAML AuthnRequest or LogoutRequest without a valid signature, impersonating a legitimate Service Provider (SP).</li>
<li>The attacker sends the forged SAML request to the Admidio instance via HTTP GET or POST to <code>modules/sso/index.php</code>.</li>
<li>The <code>receiveMessage()</code> function parses the SAML binding directly from the HTTP request, requiring no prior authentication.</li>
<li>The Entity ID is extracted from the forged request&rsquo;s Issuer element, and the corresponding client configuration is loaded.</li>
<li>The <code>validateSignature()</code> function is called, but its return value (indicating signature validity) is discarded.</li>
<li>For AuthnRequests, if the targeted user has an active session (<code>$gValidLogin</code> is true), the login form is skipped.</li>
<li>Admidio builds a SAML Response containing the user&rsquo;s attributes (login, name, email, roles) and sends it to the attacker-controlled <code>AssertionConsumerServiceURL</code>.</li>
<li>For LogoutRequests, the user&rsquo;s session is immediately terminated in the database, triggering a cascading single logout across all registered SPs.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to several critical impacts. The primary impact is the complete bypass of signature enforcement, negating the security benefits of the <code>smc_require_auth_signed</code> setting. This can lead to the disclosure of sensitive user attributes, including login name, email, and role memberships, to unauthorized parties by forging SSO requests and redirecting them to attacker-controlled endpoints. Furthermore, attackers can terminate any user&rsquo;s Admidio session by forging SLO requests, potentially causing a denial-of-service condition. This vulnerability affects all Admidio instances with SAML SSO enabled and can potentially impact all users of the system.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the recommended fix in the Admidio codebase to check the return value of <code>validateSignature()</code> and throw an exception on failure, as outlined in the advisory (<a href="https://github.com/advisories/GHSA-25cw-98hg-g3cg)">https://github.com/advisories/GHSA-25cw-98hg-g3cg)</a>.</li>
<li>Deploy the Sigma rule &ldquo;Admidio Forged SAML AuthnRequest Detection&rdquo; to detect potentially malicious SAML AuthnRequests lacking a valid signature via webserver logs.</li>
<li>Deploy the Sigma rule &ldquo;Admidio Forged SAML LogoutRequest Detection&rdquo; to detect potentially malicious SAML LogoutRequests lacking a valid signature via webserver logs.</li>
<li>Monitor webserver logs for requests to <code>/adm_program/modules/sso/index.php/saml/sso</code> and <code>/adm_program/modules/sso/index.php/saml/slo</code> without proper signature validation to detect potential exploitation attempts.</li>
<li>Upgrade to a patched version of Admidio to address CVE-2026-41669.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>saml</category><category>signature-bypass</category><category>authentication</category><category>authorization</category><category>web-application</category></item><item><title>Stripe Webhook Signature Bypass via Empty Secret Enables Unlimited Quota Fraud</title><link>https://feed.craftedsignal.io/briefs/2026-04-stripe-webhook-bypass/</link><pubDate>Fri, 24 Apr 2026 15:43:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-stripe-webhook-bypass/</guid><description>A vulnerability in the Stripe webhook handler allows an unauthenticated attacker to forge webhook events and credit arbitrary quota to their account without payment, stemming from an empty StripeWebhookSecret and lack of PaymentMethod validation, enabling cross-gateway exploitation.</description><content:encoded><![CDATA[<p>A critical vulnerability exists in the Stripe webhook handler that allows an unauthenticated attacker to forge webhook events and credit arbitrary quota to their account without making any payment. Disclosed on 2025-04-15 and patched the same day in v0.12.10, the vulnerability stems from three compounding flaws: the Stripe webhook endpoint does not reject requests when <code>StripeWebhookSecret</code> is empty (the default), any attacker can compute valid webhook signatures when the HMAC secret is empty, and the <code>Recharge</code> function does not validate that the order&rsquo;s <code>PaymentMethod</code> matches the callback source. This enables cross-gateway exploitation where orders created via any payment method can be fulfilled through a forged Stripe webhook. This vulnerability allows for financial fraud through unlimited API quota acquisition without payment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker registers a user account on the target platform.</li>
<li>Attacker calls <code>POST /api/user/pay</code> to create an Epay top-up order, setting the <code>amount</code>. The order is stored with a <code>pending</code> status.</li>
<li>Attacker queries <code>GET /api/user/topup/self</code> to retrieve the <code>trade_no</code> of the pending order.</li>
<li>Attacker computes an <code>HMAC-SHA256</code> signature with an empty key over a crafted <code>checkout.session.completed</code> payload. This payload contains the stolen <code>trade_no</code> as the <code>client_reference_id</code>.</li>
<li>Attacker sends a <code>POST</code> request to <code>/api/stripe/webhook</code> with the forged payload and a crafted <code>Stripe-Signature</code> header.</li>
<li>The server verifies the signature, which passes because the <code>StripeWebhookSecret</code> is empty.</li>
<li>The server calls the <code>Recharge()</code> function, which finds the Epay order by <code>trade_no</code>, marks the order as <code>success</code>, and credits the attacker&rsquo;s account with the full quota.</li>
<li>The attacker repeats steps 2-6 indefinitely to accumulate unlimited credits, leading to financial fraud.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This vulnerability allows attackers to obtain unlimited API quota without payment, leading to financial fraud. The operator of the vulnerable system faces financial losses due to fraudulent quota consumption against upstream AI providers such as OpenAI, Anthropic, and Google. The fraudulent top-ups can appear as normal transactions in system logs, making detection challenging. Due to the default insecure configuration, virtually all deployments with any payment method enabled are vulnerable, creating a wide exposure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Set <code>StripeWebhookSecret</code> to a non-empty value to prevent empty-key HMAC forgery, mitigating the primary attack vector (Flaw 1).</li>
<li>Apply a reverse proxy (Nginx, Caddy, etc.) to deny access to <code>/api/stripe/webhook</code> if Stripe is not configured, as a temporary workaround.</li>
<li>Deploy the Sigma rule <code>Detect Forged Stripe Webhook Request</code> to identify potential exploitation attempts by monitoring requests to the webhook endpoint with empty secrets or invalid signatures.</li>
<li>Upgrade to v0.12.10 immediately, as it addresses all three flaws completely.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>stripe</category><category>webhook</category><category>signature-bypass</category><category>quota-fraud</category></item><item><title>ASP.NET Core Improper Signature Verification Vulnerability (CVE-2026-40372)</title><link>https://feed.craftedsignal.io/briefs/2026-04-aspnet-privesc/</link><pubDate>Wed, 22 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-aspnet-privesc/</guid><description>CVE-2026-40372 is a critical vulnerability in ASP.NET Core stemming from improper cryptographic signature verification, potentially enabling unauthorized attackers to achieve network-based privilege escalation.</description><content:encoded><![CDATA[<p>CVE-2026-40372 describes a critical vulnerability affecting ASP.NET Core applications. This flaw arises from the improper verification of cryptographic signatures, creating an avenue for unauthorized attackers to elevate their privileges within a network. Successful exploitation of this vulnerability could grant attackers significant control over affected systems. According to the NVD, the CVE was published on April 21, 2026. Given the severity of privilege escalation and the potential for widespread impact on ASP.NET Core deployments, this vulnerability poses a significant risk and demands immediate attention from security teams. The vulnerability is referenced by Microsoft in their advisory related to CVE-2026-40372.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an ASP.NET Core application vulnerable to CVE-2026-40372.</li>
<li>The attacker crafts a malicious request containing a tampered cryptographic signature.</li>
<li>The vulnerable ASP.NET Core application fails to properly verify the cryptographic signature due to the flaw described in CVE-2026-40372.</li>
<li>The application processes the malicious request as if it were legitimate, bypassing authentication or authorization checks.</li>
<li>The attacker leverages the bypassed checks to gain access to sensitive functions or data.</li>
<li>Attacker escalates privileges within the ASP.NET Core application context.</li>
<li>The attacker leverages the elevated privileges to perform unauthorized actions, such as modifying data, executing code, or accessing restricted resources.</li>
<li>The attacker achieves full control of the compromised ASP.NET Core application and potentially the underlying server, depending on application permissions and configuration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-40372 can lead to complete compromise of affected ASP.NET Core applications. An attacker gaining elevated privileges can modify sensitive data, execute arbitrary code, or disrupt services. Given the widespread use of ASP.NET Core in web applications across various sectors, the potential impact is substantial. The vulnerability&rsquo;s critical severity (CVSS 9.1) highlights the high risk it poses to organizations relying on ASP.NET Core.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security update provided by Microsoft to address CVE-2026-40372 as detailed in the Microsoft advisory [https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40372].</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious ASP.NET Core Request&rdquo; to identify potential exploitation attempts in web server logs.</li>
<li>Review ASP.NET Core application configurations to minimize the potential impact of privilege escalation.</li>
<li>Enable web server logging to capture detailed information about incoming requests, aiding in the detection and investigation of exploitation attempts (webserver category).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>aspnet</category><category>privilege-escalation</category><category>cve-2026-40372</category><category>signature-bypass</category></item><item><title>Jsrsasign &lt; 11.1.1 Incorrect Conversion Vulnerability (CVE-2026-4602)</title><link>https://feed.craftedsignal.io/briefs/2026-03-jsrsasign-vuln/</link><pubDate>Mon, 23 Mar 2026 06:16:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-jsrsasign-vuln/</guid><description>Jsrsasign versions before 11.1.1 are vulnerable to an incorrect conversion between numeric types vulnerability, where an attacker can force the computation of incorrect modular inverses and break signature verification by calling modPow with a negative exponent.</description><content:encoded>&lt;p>Jsrsasign is a free open source cryptography library for JavaScript. Versions before 11.1.1 contain an incorrect conversion between numeric types due to improper handling of negative exponents in the &lt;code>ext/jsbn2.js&lt;/code> file. This vulnerability, identified as CVE-2026-4602, allows an attacker to force the computation of incorrect modular inverses, leading to the potential breakage of signature verification. The vulnerability was reported and patched in March 2026. This could allow an attacker to…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>jsrsasign</category><category>vulnerability</category><category>signature-bypass</category></item></channel></rss>