Description
A cryptographic authentication bypass vulnerability exists in OneLogin AD Connector prior to 6.1.5 due to the exposure of a tenant’s SSO JWT signing key via the /api/adc/v4/configuration endpoint. An attacker in possession of the signing key can craft valid JWT tokens impersonating arbitrary users within a OneLogin tenant. The tokens allow authentication to the OneLogin SSO portal and all downstream applications federated via SAML or OIDC. This allows full unauthorized access across the victim’s SaaS environment.
Problem types
CWE-290 Authentication Bypass by Spoofing
Product status
Any version before 6.1.5
Credits
SpecterOps
References
support.onelogin.com/product-notification/noti-00001768
specterops.io/...nant-to-compromising-customer-signing-keys/
vulncheck.com/...es/onelogin-ad-connector-account-compromise