During vulnerability testing of an application that uses the IdPReact component, we have identified 2 vulnerabilities in the IdP application used for Single Sign-On (SSO) using SAML 2.0:
Is there a way to address these 2 vulnerabilities?
Thanks in advance for your support and contribution.
Kind Regards,
Gabriele
Hi @Gabriele Gimelli,Thank you for reporting this.If you are on version 11.10.0 or above, you should be able to remove the IdPReact usage altogether and instead enable the Single Sign On between app types in Service Center.https://success.outsystems.com/documentation/11/managing_the_applications_lifecycle/secure_the_applications/configure_app_authentication/This is in fact the recommended way to use the component. IdPReact was a temporary implementation while the above feature hadn't yet been released on the platform.You will need to enable secure cookies in Lifetime before you are able to enable the setting above.https://success.outsystems.com/documentation/11/developing_an_application/secure_the_application/enable_secure_session_cookies_and_set_application_cookies_as_secure/#secure-session-cookiesAfter enabling the setting, you will be able to use the "IdP_SSO_URL" and "IdP_SingleLogout_URL" in your reactive application directly without having to use the actions from IdPReact. This will also improve the end-user experience with one less redirect in the authentication flow.In any case, I'll try to work on a way to fix the issues reported.Regards,