TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

PortSwigger Research

SAML roulette: the hacker always wins

2025-03-18 · Read original ↗

ATT&CK techniques detected

2 predictions
T1606.002SAML Tokens
52%
“’ s syntax, causing the xml comment to be processed and resulting in an entirely different node. my highly skilled colleague, zak, refined this mutation into a more streamlined and effective attack vector : this vector allowed exploitation of gitlab and any other application usin…”
T1588.006Vulnerabilities
33%
“saml roulette : the hacker always wins research academy my account customers about blog careers legal contact resellers attack surface visibility improve security posture, prioritize manual testing, free up time. ci - driven scanning more proactive security - find and fix vulnera…”

Summary

Introduction In this post, we’ll show precisely how to chain round-trip attacks and namespace confusion to achieve unauthenticated admin access on GitLab Enterprise by exploiting the ruby-saml library