Cross-IdP impersonation exploits a flaw in SSO configurations.
A technique which enables attackers to hijack the single sign-on (SSO) process to gain unauthorised access to downstream applications has been detected.
The technique, known as "Cross-IdP Impersonation," enables attackers to hijack the SSO process without compromising a company's primary identity provider (IdP).
According to security researchers at Push Security, Cross-IdP impersonation exploits a flaw in SSO configurations by allowing attackers to create fraudulent IdP accounts matching an organization’s domain, which are then used to access downstream apps via SSO.
This tactic enables unauthorized access to various downstream applications, bypassing even the most secure primary IdP protections.
“Cross-IdP impersonation could be likened to ghost logins on steroids,” said Dan Green, security researcher at Push Security. “This attack method bypasses traditional security safeguards that protect main IdP accounts. It doesn’t matter how locked down your primary IdP account is if attackers can simply create a new one for your domain.”
Written by
Dan Raywood
Senior Editor
SC Media UK
Dan Raywood is a B2B journalist with more than 20 years of experience, including covering cybersecurity for the past 16 years. He has extensively covered topics from Advanced Persistent Threats and nation-state hackers to major data breaches and regulatory changes.
He has spoken at events including 44CON, Infosecurity Europe, RANT Conference, BSides Scotland, Steelcon and ESET Security Days.
Outside work, Dan enjoys supporting Tottenham Hotspur, managing mischievous cats, and sampling craft beers.