Skip to content

Commit 46096c9

Browse files
Sebastien Faurepostmodern
Sebastien Faure
authored andcommitted
Add CVE-2024-45409 for ruby-saml and omniauth-saml
1 parent 9a88f50 commit 46096c9

File tree

2 files changed

+31
-0
lines changed

2 files changed

+31
-0
lines changed

gems/omniauth-saml/CVE-2024-45409.yml

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
---
2+
gem: omniauth-saml
3+
cve: 2024-45409
4+
ghsa: jw9c-mfg7-9rx2
5+
url: https://github.com/omniauth/omniauth-saml/commit/4274e9d57e65f2dcaae4aa3b2accf831494f2ddd
6+
title: SAML authentication bypass via Incorrect XPath selector
7+
date: 2024-08-28
8+
description: |
9+
Ruby-SAML in <= 12.2 and 1.13.0 <= 1.16.0 does not properly verify the signature of the SAML Response.
10+
An unauthenticated attacker with access to any signed saml document (by the IdP) can thus forge a SAML
11+
Response/Assertion with arbitrary contents. This would allow the attacker to log in as arbitrary user within
12+
the vulnerable system.
13+
cvss_v3: 10.0
14+
patched_versions:
15+
- ">= 2.2.0"

gems/ruby-saml/CVE-2024-45409.yml

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
---
2+
gem: ruby-saml
3+
cve: 2024-45409
4+
ghsa: jw9c-mfg7-9rx2
5+
url: https://github.com/SAML-Toolkits/ruby-saml/commit/1ec5392bc506fe43a02dbb66b68741051c5ffeae
6+
title: SAML authentication bypass via Incorrect XPath selector
7+
date: 2024-08-28
8+
description: |
9+
Ruby-SAML in <= 12.2 and 1.13.0 <= 1.16.0 does not properly verify the signature of the SAML Response.
10+
An unauthenticated attacker with access to any signed saml document (by the IdP) can thus forge a SAML
11+
Response/Assertion with arbitrary contents. This would allow the attacker to log in as arbitrary user within
12+
the vulnerable system.
13+
cvss_v3: 10.0
14+
patched_versions:
15+
- "~> 1.12.3"
16+
- ">= 1.17.0"

0 commit comments

Comments
 (0)