Authentication bypass via sequential user IDs in Microsoft SSO integration | Critical Vulnerability
文章指出单点登录(SSO)常被忽视且存在严重漏洞。尽管表面看似安全,但后端可能依赖不可靠的客户端数据,导致用户身份被篡改。作者强调开发者需重新审视假设,测试人员应深入挖掘,产品经理需确保SSO在服务器端验证,而非仅依赖UI展示。 2025-10-13 07:26:4 Author: infosecwriteups.com(查看原文) 阅读量:134 收藏

Irsyad Muhammad Fawwaz

If you’re a penetration tester or bug bounty hunter, never skip SSO in your tests. It’s one of those features that everyone assumes is safe, but I keep finding critical flaws in it.

I decided to write this because I’ve bumped into the same kind of bug more than once, and it keeps surprising me that it still exists. People often think that once an application has Single Sign-On, especially with something like Microsoft, then authentication is automatically safe. But that assumption is dangerous.

During a recent test, I found that the login process looked perfectly fine on the surface Microsoft SSO, Authenticator prompt, everything in place. But when I dug deeper into the backend, the whole security model fell apart. The server was relying on a predictable user_id from the client to decide which account was active. Change that value, and suddenly you’re logged in as someone else.

I’m writing this because this pattern keeps repeating. If you’re on the dev side recheck your assumptions. If you’re a tester don’t stop at the happy path. If you’re on the product side insist your team prove that SSO is validated server side not just shown in the UI.


文章来源: https://infosecwriteups.com/authentication-bypass-via-sequential-user-ids-in-microsoft-sso-integration-critical-vulnerability-d5f498ccdae7?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh