Skip to content

Latest commit

 

History

History
20 lines (11 loc) · 815 Bytes

File metadata and controls

20 lines (11 loc) · 815 Bytes

SAMLjacking on Nuclino

Nuclino allows SAML integrations even on their free tier, so makes a great test case. This is the SAML configuration page (showing the SSO URL):

screenshot

The adversary could set the tenant name to match the target (e.g “Ctrlaltsecure” targeting ctrlaltsecure.com): https://app.nuclino.com/Ctrlaltsecure

The target would then see this legitimate login page:

screenshot

When clicking login, the user would be redirected to a legitimate-looking phishing page:

screenshot

A demo video of an attack chain combining SAMLjacking with a poisoned tenant using Nuclino is given below:

demo video