SAML Raider is a Burp Suite extension for testing SAML infrastructures. It contains two core functionalities: Manipulating SAML Messages and manage X.509 certificates.
This software was originally created by Roland Bischofberger and Emanuel Duss (@emanuelduss) during a bachelor thesis at the Hochschule für Technik Rapperswil (HSR).
The extension is divided in two parts. A SAML message editor and a certificate management tool.
Features of the SAML Raider message editor:
- Sign SAML messages & assertions (signature spoofing attack)
- Remove signatures (signature exclusion attack)
- Edit SAML messages (SAMLRequest, SAMLResponse & custom parameter names)
- Perform eight common XSW attacks
- Insert XXE and XSLT attack payloads
- Supported Profiles: SAML Webbrowser Single Sign-on Profile, Web Services Security SAML Token Profile
- Supported Bindings: POST Binding, Redirect Binding, SOAP Binding, URI Binding
SAML Attacks:
SAML Message Info:
Features of the SAML Raider Certificate Management:
- Import X.509 certificates (PEM and DER format)
- Import X.509 certificate chains
- Export X.509 certificates (PEM format)
- Delete imported X.509 certificates
- Display informations of X.509 certificates
- Import private keys (PKCD#8 in DER format and traditional RSA in PEM Format)
- Export private keys (traditional RSA Key PEM Format)
- Cloning X.509 certificates
- Cloning X.509 certificate chains
- Create new X.509 certificates
- Editing and self-sign existing X.509 certificates
Certificate Management:
SAML Signature Spoofing Demo:
FusionAuth XXE Demo (CVE-2021-27736):
The recommended and easiest way to install SAML Raider is using the BApp Store.
Open Burp and click in the Extensions
tab on the BApp Store
tab. Select SAML Raider
and hit the Install
button to install our extension.
Don't forget to rate our extension with as many stars you like 😄.
First, download the latest SAML Raider version:
saml-raider-2.0.4.jar.
Then, start Burp Suite and click in the Extensions
tab on Add
. Choose the
SAML Raider JAR file to install it and you are ready to go.
To test SAML environments more comfortable, you could add a intercept rule in
the proxy settings. Add a new rule which checks if a Parameter Name
SAMLResponse
is in the request. We hope the usage of our extension is mostly
self explaining 😄. If you have questions, don't hesitate to ask us!
If you have a custom parameter name for a SAML message, this can be configured in the SAML Raider Certificates tab.
If you don't want to let SAML Raider parse your SAML message before sending to the server (e.g. when performing XXE attacks), use the raw mode.
See hacking.
Feedback is welcome! Please contact us or create a new issue on GitHub.
See the LICENSE file (MIT License) for license rights and limitations.
SAML Raider is on the Internet :).
- Our bachelor thesis where SAML Raider was born: eprints_BA_SAML2_Burp_Plugin_SAML_Raider_eduss_rbischof.pdf.
- PortSwigger Burp BApp Store: https://portswigger.net/bappstore/c61cfa893bb14db4b01775554f7b802e
- SAML Raider in our Company Blog @CompassSecurity: https://blog.compass-security.com/tag/saml-raider/
- Schwachstellen in SAML 2.0 Implementationen: https://www.syssec.at/en/veranstaltungen/archiv/dachsecurity2016/papers/DACH_Security_2016_Paper_12A1.pdf
- Awesome SAML Security Testing Blog Posts by @epi052:
- SAML Testing Methodology Basics: https://epi052.gitlab.io/notes-to-self/blog/2019-03-07-how-to-test-saml-a-methodology/
- SAML Testing Methodology using SAML Raider: https://epi052.gitlab.io/notes-to-self/blog/2019-03-13-how-to-test-saml-a-methodology-part-two/
- Hack SAML Single Sign-on with Burp Suite: https://null-byte.wonderhowto.com/how-to/hack-saml-single-sign-with-burp-suite-0184405/
- Attacking SSO: Common SAML Vulnerabilities and Ways to Find Them: https://blog.netspi.com/attacking-sso-common-saml-vulnerabilities-ways-find/
- How to use Burp Suite to verify SAML Signature Wrapping attack: https://blog.ritvn.com/testing/2018/02/16/burp-suite-saml-signature-wrapping-attack.html
- Vulnerabilities Related to SAML: https://varutra.com/blog/?p=1945b
- Owning SAML: https://www.anitian.com/owning-saml/
- CVE-2015-5372: nevisAuth Authentication Bypass (Signature Spoofing)
- Slack SAML Authentication Bypass:
- CVE-2020-12676: FusionAuth Signature Exclusion Attack
- CVE-2021-27736: FusionAuth SAML Library
- SANS Burp Suite Cheat Sheet recommends SAML Raider: https://www.sans.org/security-resources/posters/pen-testing/burp-suite-cheat-sheet-280?msc=Cheat+Sheet+Blog
- Roland Bischofberger (GitHub: RouLee)
- Emanuel Duss (GitHub: emanuelduss)
- Tobias Hort-Giess (GitHub: t-hg)