SAML Raider is a Burp Suite extension for testing SAML infrastructures. It contains two core functionalities: Manipulating SAML Messages and manage X.509 certificates.
This software was originally created by Roland Bischofberger and Emanuel Duss (@emanuelduss) during a bachelor thesis at the Hochschule für Technik Rapperswil (HSR).
The extension is divided in two parts. A SAML message editor and a certificate management tool.
Features of the SAML Raider message editor:
SAML Attacks:
SAML Message Info:
Features of the SAML Raider Certificate Management:
Certificate Management:
SAML Signature Spoofing Demo:
FusionAuth XXE Demo (CVE-2021-27736):
The recommended and easiest way to install SAML Raider is using the BApp Store.
Open Burp and click in the Extensions
tab on the BApp Store
tab. Select SAML Raider
and hit the Install
button to install our extension.
Don't forget to rate our extension with as many stars you like :smile:.
First, download the latest SAML Raider version:
saml-raider-2.0.4.jar.
Then, start Burp Suite and click in the Extensions
tab on Add
. Choose the
SAML Raider JAR file to install it and you are ready to go.
To test SAML environments more comfortable, you could add a intercept rule in
the proxy settings. Add a new rule which checks if a Parameter Name
SAMLResponse
is in the request. We hope the usage of our extension is mostly
self explaining :smile:. If you have questions, don't hesitate to ask us!
If you have a custom parameter name for a SAML message, this can be configured in the SAML Raider Certificates tab.
If you don't want to let SAML Raider parse your SAML message before sending to the server (e.g. when performing XXE attacks), use the raw mode.
See hacking.
Feedback is welcome! Please contact us or create a new issue on GitHub.
See the LICENSE file (MIT License) for license rights and limitations.
SAML Raider is on the Internet :).