Skip to content

Commit 0089cbf

Browse files
jasnowRubySec CI
authored and
RubySec CI
committed
Updated advisory posts against rubysec/ruby-advisory-db@a49ad8b
1 parent 4bf5908 commit 0089cbf

File tree

1 file changed

+33
-0
lines changed

1 file changed

+33
-0
lines changed
Lines changed: 33 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,33 @@
1+
---
2+
layout: advisory
3+
title: 'GHSA-cvp8-5r8g-fhvq (omniauth-saml): omniauth-saml vulnerable to Improper
4+
Verification of Cryptographic Signature'
5+
comments: false
6+
categories:
7+
- omniauth-saml
8+
advisory:
9+
gem: omniauth-saml
10+
ghsa: cvp8-5r8g-fhvq
11+
url: https://github.com/SAML-Toolkits/ruby-saml/security/advisories/GHSA-jw9c-mfg7-9rx2
12+
title: omniauth-saml vulnerable to Improper Verification of Cryptographic Signature
13+
date: 2024-09-11
14+
description: |
15+
ruby-saml, the dependent SAML gem of omniauth-saml has a signature
16+
wrapping vulnerability in <= v1.12.0 and v1.13.0 to v1.16.0 , see
17+
https://github.com/SAML-Toolkits/ruby-saml/security/advisories/GHSA-jw9c-mfg7-9rx2
18+
19+
As a result, omniauth-saml created a
20+
[new release](https://github.com/omniauth/omniauth-saml/releases)
21+
by upgrading ruby-saml to the patched versions v1.17.
22+
cvss_v3: 10.0
23+
patched_versions:
24+
- ">= 2.1.1"
25+
related:
26+
ghsa:
27+
- https://github.com/omniauth/omniauth-saml/security/advisories/GHSA-cvp8-5r8g-fhvq
28+
- https://github.com/SAML-Toolkits/ruby-saml/security/advisories/GHSA-jw9c-mfg7-9rx2
29+
- https://github.com/advisories/GHSA-cvp8-5r8g-fhvq
30+
url:
31+
- https://github.com/omniauth/omniauth-saml/commit/4274e9d57e65f2dcaae4aa3b2accf831494f2ddd
32+
- https://github.com/omniauth/omniauth-saml/commit/6c681fd082ab3daf271821897a40ab3417382e29
33+
---

0 commit comments

Comments
 (0)