Recently a security vulnerability was discovered in a number of SAML SSO implementations which makes it possible for a signed SAML token to be manipulated to impersonate another user or to change the scope of a user’s authorization in some circumstances. The vulnerability is described in the finder’s blog, here. Many of you have been asking whether this affects Microsoft identity servers and services.
We can confirm that Microsoft Azure Active Directory, Azure Active Directory B2C and Microsoft Windows Server Active Directory Federation Services (ADFS) are NOT affected by this vulnerability. The Microsoft account system is also NOTaffected. Additionally, we can confirm that neither the Windows Identity Foundation (WIF) nor the ASP.NET WS-Federation middleware have this vulnerability.
Read more about it in the Enterprise Mobility + Security blog.