SSO Ticket exploit

Status
Not open for further replies.

Rain

c
Mar 13, 2015
558
243
So, the SSO ticket exploit from a while back where they get into staff account with a blank SSO ticket, it's just happened to me on habsay as my staff ID was 1.

I checked the emu to see if it was making sure the SSO wasn't blank and it was;
F_cyIP6FSCqUNHDsZfrbsA.png

How was he able to do this?

When i set my SSO ticket to a value while i am online, he got on to an account called 'Hayley'
I-PX5wzTRE_mS1K13y7KPA.png


If it's checking for an empty SSO, and he still got on my account, why is that?
Is there a value he could've entered that's empty in mysql?
 
Last edited:

Rain

c
Mar 13, 2015
558
243
He shouldn't be able to run any SQL if you're using prepared statements and binding the SSO variable.
He's not running an SQL, he's just connecting to the client with a blank SSO.
The SSO variable is bound -
 

Brad

Well-Known Member
Jun 5, 2012
2,319
992
Not 100% sure if this will work or make a difference with the check in place for an empty string. But maybe try adding SSO.Length > 0
 

Zodiak

recovering crack addict
Nov 18, 2011
450
411
? ?
Code:
if (string.IsNullOrEmpty(SSO) || string.IsNullOrWhiteSpace(SSO) || SSO.Length < 15)
return;

No need for the extra code, because it shouldn't run anyway if the above if statement is triggered.
 

Rain

c
Mar 13, 2015
558
243
Code:
if (string.IsNullOrEmpty(SSO) || string.IsNullOrWhiteSpace(SSO) || SSO.Length < 15)
return;

No need for the extra code, because it shouldn't run anyway if the above if statement is triggered.
i feel as though there's a string that represents null or empty in an SQL query, that they could have used.
 

Damien

Don't need glasses if you can C#
Feb 26, 2012
429
642
Just separate the SSO tickets from the user table and delete them once the user has authenticated. I find is assuming how I got slated when I posted my version a while back, but yet I've seen people have nothing but trouble with this version.

Also if you're keeping the SSO's you're giving them the same opportunities to log onto random accounts (not as much, but still insecure).

The proper way it should be done is separate with a timeout, so if a connection isn't made within the given time. The SSO is destroyed automatically.
 
  • Like
Reactions: Joe

Rain

c
Mar 13, 2015
558
243
Just separate the SSO tickets from the user table and delete them once the user has authenticated. I find is assuming how I got slated when I posted my version a while back, but yet I've seen people have nothing but trouble with this version.

Also if you're keeping the SSO's you're giving them the same opportunities to log onto random accounts (not as much, but still insecure).

The proper way it should be done is separate with a timeout, so if a connection isn't made within the given time. The SSO is destroyed automatically.
tru, will look into it
 
Status
Not open for further replies.

Users who are viewing this thread

Top