File tree Expand file tree Collapse file tree 2 files changed +31
-0
lines changed Expand file tree Collapse file tree 2 files changed +31
-0
lines changed Original file line number Diff line number Diff line change
1
+ ---
2
+ gem : omniauth-saml
3
+ cve : 2024-45409
4
+ ghsa : jw9c-mfg7-9rx2
5
+ url : https://github.com/omniauth/omniauth-saml/commit/4274e9d57e65f2dcaae4aa3b2accf831494f2ddd
6
+ title : SAML authentication bypass via Incorrect XPath selector
7
+ date : 2024-08-28
8
+ description : |
9
+ Ruby-SAML in <= 12.2 and 1.13.0 <= 1.16.0 does not properly verify the signature of the SAML Response.
10
+ An unauthenticated attacker with access to any signed saml document (by the IdP) can thus forge a SAML
11
+ Response/Assertion with arbitrary contents. This would allow the attacker to log in as arbitrary user within
12
+ the vulnerable system.
13
+ cvss_v3 : 10.0
14
+ patched_versions :
15
+ - " >= 2.2.0"
Original file line number Diff line number Diff line change
1
+ ---
2
+ gem : ruby-saml
3
+ cve : 2024-45409
4
+ ghsa : jw9c-mfg7-9rx2
5
+ url : https://github.com/SAML-Toolkits/ruby-saml/commit/1ec5392bc506fe43a02dbb66b68741051c5ffeae
6
+ title : SAML authentication bypass via Incorrect XPath selector
7
+ date : 2024-08-28
8
+ description : |
9
+ Ruby-SAML in <= 12.2 and 1.13.0 <= 1.16.0 does not properly verify the signature of the SAML Response.
10
+ An unauthenticated attacker with access to any signed saml document (by the IdP) can thus forge a SAML
11
+ Response/Assertion with arbitrary contents. This would allow the attacker to log in as arbitrary user within
12
+ the vulnerable system.
13
+ cvss_v3 : 10.0
14
+ patched_versions :
15
+ - " ~> 1.12.3"
16
+ - " >= 1.17.0"
You can’t perform that action at this time.
0 commit comments