Authentication bypass via sequential user IDs in Microsoft SSO integration | Critical Vulnerability
单点登录(SSO)常被误认为安全无虞,但其后端逻辑可能存在严重漏洞。作者在测试中发现某系统依赖客户端提供的可预测`user_id`来确定活跃账户,导致身份验证机制失效。此问题反复出现提醒开发者、测试人员和产品经理需重新审视SSO的安全性并确保其在服务器端得到充分验证。 2025-10-13 07:26:4 Author: infosecwriteups.com(查看原文) 阅读量:133 收藏

Irsyad Muhammad Fawwaz

If you’re a penetration tester or bug bounty hunter, never skip SSO in your tests. It’s one of those features that everyone assumes is safe, but I keep finding critical flaws in it.

I decided to write this because I’ve bumped into the same kind of bug more than once, and it keeps surprising me that it still exists. People often think that once an application has Single Sign-On, especially with something like Microsoft, then authentication is automatically safe. But that assumption is dangerous.

During a recent test, I found that the login process looked perfectly fine on the surface Microsoft SSO, Authenticator prompt, everything in place. But when I dug deeper into the backend, the whole security model fell apart. The server was relying on a predictable user_id from the client to decide which account was active. Change that value, and suddenly you’re logged in as someone else.

I’m writing this because this pattern keeps repeating. If you’re on the dev side recheck your assumptions. If you’re a tester don’t stop at the happy path. If you’re on the product side insist your team prove that SSO is validated server side not just shown in the UI.


文章来源: https://infosecwriteups.com/authentication-bypass-via-sequential-user-ids-in-microsoft-sso-integration-critical-vulnerability-d5f498ccdae7?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh