<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Sso — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/sso/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 30 Apr 2026 20:45:20 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/sso/feed.xml" rel="self" type="application/rss+xml"/><item><title>Sentry SAML SSO Improper Authentication Allows User Identity Linking</title><link>https://feed.craftedsignal.io/briefs/2026-05-sentry-saml-takeover/</link><pubDate>Thu, 30 Apr 2026 20:45:20 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-sentry-saml-takeover/</guid><description>A critical vulnerability (CVE-2026-42354) exists in Sentry's SAML SSO implementation that allows an attacker to take over any user account by using a malicious SAML Identity Provider and another organization on the same Sentry instance, affecting self-hosted users with multiple organizations configured if a malicious user has permissions to modify SSO settings, while Sentry SaaS was patched in April and self-hosted users are advised to upgrade to version 26.4.1 or higher.</description><content:encoded><![CDATA[<p>A critical vulnerability, CVE-2026-42354, has been identified in the SAML Single Sign-On (SSO) implementation of Sentry, potentially allowing an attacker to compromise user accounts. This vulnerability stems from improper authentication during the SAML SSO process, leading to the possibility of user identity linking. The vulnerability affects Sentry versions 21.12.0 up to and including 26.4.0. To exploit this vulnerability, an attacker requires a malicious SAML Identity Provider and access to another organization within the same Sentry instance, coupled with knowledge of the victim&rsquo;s email address. This attack vector poses a significant risk to self-hosted Sentry instances that are configured with multiple organizations (SENTRY_SINGLE_ORGANIZATION = False), where a malicious user possesses the necessary permissions to modify SSO settings for a different organization. Sentry SaaS has already been patched in April.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains access to a Sentry instance that has multiple organizations configured.</li>
<li>The attacker obtains permissions to modify the SAML SSO settings of at least one organization within the Sentry instance.</li>
<li>The attacker crafts a malicious SAML Identity Provider (IdP) designed to inject or manipulate user identity attributes.</li>
<li>The attacker uses the malicious SAML IdP to initiate a single sign-on (SSO) process to a Sentry organization they control.</li>
<li>The attacker provides the email address of the targeted victim, linking the victim&rsquo;s identity in the Sentry instance to the malicious SAML IdP.</li>
<li>The victim attempts to log in to their Sentry account through SAML SSO.</li>
<li>Due to the vulnerability, Sentry incorrectly authenticates the victim based on the attributes provided by the attacker&rsquo;s malicious SAML IdP.</li>
<li>The attacker successfully takes over the victim&rsquo;s account, gaining access to sensitive data and functionalities associated with the victim&rsquo;s privileges.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to complete account takeover, resulting in unauthorized access to sensitive project data, configuration settings, and potentially even administrative privileges within the Sentry instance. This poses a substantial risk to organizations using vulnerable Sentry versions, as attackers could exfiltrate sensitive information, modify configurations, or disrupt services. The impact is particularly severe for self-hosted Sentry instances with multiple organizations, where a single compromised account could lead to broader access across the entire platform.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade self-hosted Sentry instances to version 26.4.1 or higher to patch CVE-2026-42354.</li>
<li>Enable user account-based two-factor authentication (2FA) for all Sentry accounts as a preventative measure, as mentioned in the Workarounds section.</li>
<li>Monitor Sentry audit logs for any unauthorized changes to SAML SSO configurations, particularly within multi-organization setups, to detect potential exploitation attempts.</li>
<li>Review and restrict permissions for modifying SSO settings across all organizations to minimize the attack surface, as described in the Overview.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>authentication</category><category>saml</category><category>sso</category><category>account takeover</category><category>vulnerability</category></item><item><title>Sentry SAML SSO Improper Authentication Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-sentry-saml-sso-takeover/</link><pubDate>Sat, 18 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-sentry-saml-sso-takeover/</guid><description>A critical vulnerability in Sentry's SAML SSO implementation allows account takeover by exploiting improper authentication when multiple organizations are configured, affecting versions 21.12.0 to 26.2.0 and requiring a malicious SAML Identity Provider and knowledge of the victim's email address.</description><content:encoded><![CDATA[<p>A critical vulnerability (CVE-2026-27197) has been identified in the SAML Single Sign-On (SSO) implementation within Sentry, a popular error tracking and performance monitoring platform. This vulnerability allows a malicious actor to potentially take over user accounts by leveraging a rogue SAML Identity Provider (IdP) in conjunction with another organization configured within the same Sentry instance. The attacker needs to know the victim&rsquo;s email address for successful exploitation. This flaw primarily impacts self-hosted Sentry deployments with multiple organizations enabled (SENTRY_SINGLE_ORGANIZATION = False) and where a malicious user possesses the ability to modify SSO settings for another organization. Sentry SaaS was patched on February 18, 2026. Self-hosted users should upgrade to version 26.2.0 or later to remediate this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains access to a Sentry instance that hosts multiple organizations. This could be through compromised credentials or other initial access vectors.</li>
<li>The attacker identifies a target user&rsquo;s email address within the Sentry instance.</li>
<li>The attacker gains permissions to modify SSO settings for an organization within the Sentry instance.</li>
<li>The attacker configures a malicious SAML Identity Provider (IdP) for the organization they control. This IdP is designed to spoof user identities.</li>
<li>The victim attempts to log in to Sentry via SAML SSO.</li>
<li>Sentry redirects the victim to the attacker&rsquo;s malicious SAML IdP for authentication.</li>
<li>The attacker&rsquo;s malicious SAML IdP asserts the victim&rsquo;s identity (using the known email address) to Sentry, but the assertion is illegitimate and controlled by the attacker.</li>
<li>Sentry, due to the vulnerability, improperly validates the SAML assertion, allowing the attacker to successfully authenticate as the victim and gain unauthorized access to their account.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to completely take over a targeted user&rsquo;s Sentry account. This grants the attacker the ability to access sensitive project data, modify configurations, invite/remove team members, and potentially disrupt the entire Sentry instance&rsquo;s operations. The vulnerability affects Sentry versions 21.12.0 up to, but not including, 26.2.0. The number of potential victims depends on the number of vulnerable Sentry instances with multiple organizations configured and the attacker&rsquo;s ability to modify SSO settings.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade self-hosted Sentry instances to version 26.2.0 or later to patch CVE-2026-27197.</li>
<li>Enable two-factor authentication (2FA) on all Sentry accounts. Users can manage this in Account Settings &gt; Security, as mentioned in the <a href="https://sentry.zendesk.com/hc/en-us/articles/46773315774235-How-do-I-enable-two-factor-authentication-2FA-on-my-Sentry-account">helpdesk article</a>.</li>
<li>Monitor Sentry logs for unusual SSO configuration changes, specifically modifications to SAML Identity Provider settings. Deploy a rule that detects modifications to the <code>SENTRY_SINGLE_ORGANIZATION</code> setting, as this is a prerequisite for exploitation.</li>
<li>Implement the Sigma rule <code>Detect Suspicious SAML Authentication</code> to identify potential unauthorized SAML authentication attempts based on unusual IP addresses or user agents.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>sentry</category><category>saml</category><category>sso</category><category>authentication</category><category>account-takeover</category></item><item><title>Critical Certificate Validation Vulnerability in CISCO Webex Allows User Impersonation</title><link>https://feed.craftedsignal.io/briefs/2026-04-cisco-webex-cert-bypass/</link><pubDate>Fri, 17 Apr 2026 09:19:48 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-cisco-webex-cert-bypass/</guid><description>A critical improper certificate validation vulnerability in CISCO Webex versions 39.6 - 45.4 (CVE-2026-20184) allows a remote, unprivileged attacker to impersonate users, gain unauthorized access, and join meetings without authorization, potentially impacting confidentiality, integrity, and availability.</description><content:encoded><![CDATA[<p>A critical vulnerability, CVE-2026-20184, has been identified in the Single Sign-On (SSO) implementation with Control Hub in CISCO Webex versions 39.6 through 45.4. This improper certificate validation issue allows an unauthenticated, remote attacker to bypass security controls and impersonate legitimate users. CISCO Webex is a widely used cloud-based platform for video meetings and collaboration. Successful exploitation could lead to unauthorized access to sensitive information, disruption of services, and a complete compromise of the CIA triad. The vulnerability poses a significant risk to organizations relying on Webex for internal and external communications. Public proof-of-concept or proof-of-exploitation code is not yet available, but the severity and ease of exploitation warrant immediate attention and patching.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable CISCO Webex instance running a version between 39.6 and 45.4.</li>
<li>The attacker crafts a malicious token designed to exploit the improper certificate validation flaw in the SSO with Control Hub.</li>
<li>The attacker connects to a Webex service endpoint, presenting the crafted token.</li>
<li>The vulnerable Webex instance fails to properly validate the certificate associated with the token.</li>
<li>The attacker is authenticated as a targeted user without providing valid credentials.</li>
<li>The attacker gains unauthorized access to the targeted user&rsquo;s sensitive information, including meeting schedules, contact lists, and potentially recorded meetings.</li>
<li>The attacker joins Webex meetings without authorization, potentially eavesdropping on confidential conversations or disrupting the meeting.</li>
<li>The attacker escalates privileges within the Webex environment by leveraging the compromised user&rsquo;s access rights, potentially gaining administrative control.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-20184 can lead to severe consequences. Attackers can impersonate any user within the Webex service, gaining unauthorized access to confidential meetings, sensitive data, and internal communications. This can result in a breach of confidentiality, integrity, and availability, potentially leading to significant financial losses, reputational damage, and legal liabilities. The number of affected organizations could be substantial given Webex&rsquo;s widespread use across various sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately patch all CISCO Webex installations to a version beyond 45.4 to remediate CVE-2026-20184 (Reference: CISCO Security Advisory).</li>
<li>Upscale monitoring and detection capabilities to identify any suspicious activity related to unauthorized access attempts within the CISCO Webex environment, as recommended by the CCB (Reference: CCB Advisory).</li>
<li>Implement the provided Sigma rule to detect suspicious authentication patterns indicative of exploitation attempts against Webex (Reference: Sigma rule - &ldquo;Webex Suspicious Authentication Pattern&rdquo;).</li>
<li>Enable and review Webex access logs for unusual login attempts or access patterns originating from unexpected locations (Reference: Webex access logs).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cisco</category><category>webex</category><category>sso</category><category>certificate-validation</category><category>user-impersonation</category><category>cve-2026-20184</category><category>cloud</category></item><item><title>Admidio SAML Assertion Consumer Service (ACS) URL Validation Bypass</title><link>https://feed.craftedsignal.io/briefs/2024-01-29-admidio-saml-acs-bypass/</link><pubDate>Mon, 29 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-29-admidio-saml-acs-bypass/</guid><description>Admidio's SAML IdP implementation in its SSO module is vulnerable to sending SAML responses to unvalidated Assertion Consumer Service URLs, allowing an attacker to craft a SAML AuthnRequest with an arbitrary AssertionConsumerServiceURL, causing the IdP to send the signed SAML response, containing user identity attributes, to an attacker-controlled URL, enabling impersonation of the victim user on the legitimate SP by replaying the SAML assertion.</description><content:encoded><![CDATA[<p>A vulnerability exists in Admidio&rsquo;s SAML IdP implementation within the SSO module (versions 5.0.8 and earlier) that allows for bypassing Assertion Consumer Service (ACS) URL validation. The IdP uses the <code>AssertionConsumerServiceURL</code> value directly from incoming SAML AuthnRequest messages as the destination for the SAML response without verifying it against the registered <code>smc_acs_url</code> for the corresponding service provider client. An attacker can exploit this by crafting a SAML AuthnRequest with the Entity ID of a registered SP client and an attacker-controlled <code>AssertionConsumerServiceURL</code>. This causes the IdP to send the signed SAML response, containing sensitive user identity attributes (login name, email, roles, profile fields), to a URL controlled by the attacker. The default configuration does not require signed AuthnRequests, simplifying exploitation to only needing the SP&rsquo;s Entity ID.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies the Entity ID of a registered SAML service provider (SP) client within the Admidio IdP. This is often publicly available from the SP&rsquo;s metadata endpoint.</li>
<li>The attacker crafts a malicious SAML AuthnRequest. The AuthnRequest includes the legitimate SP Entity ID as the Issuer, but sets the <code>AssertionConsumerServiceURL</code> to a URL controlled by the attacker (e.g., <code>https://attacker.test/steal-saml</code>).</li>
<li>The attacker sends the crafted SAML AuthnRequest to Admidio&rsquo;s SSO endpoint (<code>/modules/sso/index.php/saml/sso</code>) using the HTTP-POST binding, typically by tricking a logged-in user into accessing a webpage containing an auto-submitting form.</li>
<li>Admidio&rsquo;s SSO module receives the AuthnRequest. If signature validation is not enforced for the SP, the request proceeds without signature verification.</li>
<li>If the user is already authenticated with the Admidio IdP, the IdP generates a signed SAML response containing the user&rsquo;s identity and attributes. The destination of the SAML response is set to the attacker-controlled <code>AssertionConsumerServiceURL</code> taken directly from the AuthnRequest.</li>
<li>Admidio renders an auto-submitting HTML form in the victim&rsquo;s browser, which POSTs the signed SAML response to the attacker&rsquo;s URL (<code>https://attacker.test/steal-saml</code>).</li>
<li>The attacker&rsquo;s server receives the SAML response, extracting the user&rsquo;s login name, email, full name, roles, and any other profile fields included in the assertion.</li>
<li>The attacker replays the stolen SAML assertion to the legitimate SP to authenticate as the victim, gaining unauthorized access to the SP application and its resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to steal user identities and impersonate victims on legitimate service provider applications. This leads to unauthorized access to user accounts and potential access to sensitive data and resources within those applications. The scope change enables impersonation across separate service provider applications. The vulnerability is exploitable without requiring knowledge of cryptographic keys if <code>smc_require_auth_signed</code> is not enabled, making it easier to exploit. All versions of Admidio up to and including 5.0.8 are affected.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the vendor-supplied patch described in GHSA-p9w9-87c8-m235 by upgrading to a version of Admidio greater than 5.0.8.</li>
<li>As a temporary mitigation, enable <code>smc_require_auth_signed</code> and <code>smc_validate_signatures</code> for all SAML clients to enforce signature validation, mitigating attacks from unauthenticated sources.</li>
<li>Monitor web server logs for POST requests to the Admidio SSO endpoint (<code>/modules/sso/index.php/saml/sso</code>) with suspicious <code>SAMLRequest</code> parameters containing attacker-controlled <code>AssertionConsumerServiceURL</code> values, which can be detected using the &ldquo;Admidio SAML AuthnRequest ACS URL Override&rdquo; Sigma rule.</li>
<li>Monitor network traffic for connections to attacker-controlled URLs, such as <code>https://attacker.test/steal-saml</code>, which may indicate successful exploitation and the exfiltration of SAML responses as listed in the IOC table.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>saml</category><category>sso</category><category>acs-bypass</category><category>admidio</category><category>cve-2026-41670</category></item></channel></rss>