You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
An attacker can perform a Denial of Service attack by constructing large XML messages and then forcing the server to verify a signature over these messages. With our most performant attacks, we were able to force the server to use 100% CPU for 30 seconds, with one 400kB signed SAML message. The countermeasure is to validate sizes of incoming XML messages, before they are processed.
The text was updated successfully, but these errors were encountered:
Vulnerability ID: SUR-407
Vulnerability Type: Denial-of-Service
Threat Level: Low
An attacker can perform a Denial of Service attack by constructing large XML messages and then forcing the server to verify a signature over these messages. With our most performant attacks, we were able to force the server to use 100% CPU for 30 seconds, with one 400kB signed SAML message. The countermeasure is to validate sizes of incoming XML messages, before they are processed.
The text was updated successfully, but these errors were encountered: