Skip to content

Commit a49ad8b

Browse files
jasnowpostmodern
authored andcommitted
GHSA SYNC: 1 brand new advisory
1 parent 46096c9 commit a49ad8b

File tree

1 file changed

+25
-0
lines changed

1 file changed

+25
-0
lines changed
Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
---
2+
gem: omniauth-saml
3+
ghsa: cvp8-5r8g-fhvq
4+
url: https://github.com/SAML-Toolkits/ruby-saml/security/advisories/GHSA-jw9c-mfg7-9rx2
5+
title: omniauth-saml vulnerable to Improper Verification of Cryptographic Signature
6+
date: 2024-09-11
7+
description: |
8+
ruby-saml, the dependent SAML gem of omniauth-saml has a signature
9+
wrapping vulnerability in <= v1.12.0 and v1.13.0 to v1.16.0 , see
10+
https://github.com/SAML-Toolkits/ruby-saml/security/advisories/GHSA-jw9c-mfg7-9rx2
11+
12+
As a result, omniauth-saml created a
13+
[new release](https://github.com/omniauth/omniauth-saml/releases)
14+
by upgrading ruby-saml to the patched versions v1.17.
15+
cvss_v3: 10.0
16+
patched_versions:
17+
- ">= 2.1.1"
18+
related:
19+
ghsa:
20+
- https://github.com/omniauth/omniauth-saml/security/advisories/GHSA-cvp8-5r8g-fhvq
21+
- https://github.com/SAML-Toolkits/ruby-saml/security/advisories/GHSA-jw9c-mfg7-9rx2
22+
- https://github.com/advisories/GHSA-cvp8-5r8g-fhvq
23+
url:
24+
- https://github.com/omniauth/omniauth-saml/commit/4274e9d57e65f2dcaae4aa3b2accf831494f2ddd
25+
- https://github.com/omniauth/omniauth-saml/commit/6c681fd082ab3daf271821897a40ab3417382e29

0 commit comments

Comments
 (0)