Releases: CompassSecurity/SAMLRaider
Releases · CompassSecurity/SAMLRaider
Release v2.0.4
v2.0.4-RC1
Fixes #80
Full Changelog: v2.0.3...v2.0.4-RC1
Release v2.0.3
Pre-Release v2.0.3-rc1
- Fixes #78
Full Changelog: v2.0.2...v2.0.3-rc1
v2.0.2
Release v2.0.1
Release v2.0.0
This release was focused on:
- Improve Developer Experience
- Migration to Montoya API
- Migration to Gradle
- Migration to JUnit 5 (Jupiter)
- Live Testing Tab
- Improve User Experience
- Cleaner UI for Certificate Tab
- Bug fixes
What's Changed
New Contributors
- @t-hg made their first contribution in #70
Full Changelog: v1.4.1...v2.0.0
Release v1.4.1
This is a bugfix release which makes SAML Raider working again in the latest Java version.
Bugfixes:
- Broken "Sign Assertion" / "Sign Message" feature in latest Java version (issue: #60 and #42, fix: ae47ed2)
- Broken "Send certificates to SAML Raider Certificates" in latest Java version (mentioned in issue #42, fix: 1b117f0)
- Problems with newlines in URL encoded messages (PR: #57)
Thanks @edmacke for testing the new version and @antoinet for your PR.
In addition, some libraries were updated to the latest version:
Release v1.4.0
This release contains:
- UI refresh (button reordering, message information are now shown in another tab to save some space, especially in repeater mode)
- Introduction of a new raw mode which prevents SAML Raider from parsing the XML before sending it to the server (useful for XXE attacks)
Bugfixes:
- XSW9 was removed from the menu because it did not work
Release 1.3.0
First release in 2021 which contains new features:
- XSW match/replace function for faster XSW attacks
- XSW9 Attack (SimpleSAMLphp Nov2019 Auth Bypass)
- Buttons to directly apply XXE and XSLT attack (note: XXE does still not work correctly, see #22)
- Use Burp Suite text editor (introduces search functionality again)
- Parameter names of the SAML request and responses can now be configured in the certificate tab
Bug fixes:
- Bug fix in XSW1 and XSW2
Thanks a lot @simioni87 for your awesome contribution (#49)!
Happy SAML hacking 🤘