Recently, a vulnerability with certain SAML implementations was discovered that attackers could use to bypass authentication to SAML service providers.
LearnCore has determined it is not affected by this vulnerability for the following reasons:
1. Multiple SAML library vendors were detected to be vulnerable to this type of attack. LearnCore's SAML implementation utilizes a library not listed as vulnerable.
2. The vulnerability specifically allows a malicious user to add comments to the response's Name ID to manipulate its text value while still passing signature validation. LearnCore's SAML implementation was specifically tested against this SAML response manipulation and was determined to be secure.
3. Service providers that use email addresses that validate against a whitelist are much less likely to be exploitable. LearnCore accounts can be configured to only authorize existing account members' email addresses. Identities outside of this whitelist are denied authentication to the service.
For more information on the SAML vulnerability, click here.
If you have further questions regarding LearnCore and SAML, please contact us at email@example.com.