Skip to content

Commit 51ef41d

Browse files
committed
Release 1.18.0
1 parent fb2eac1 commit 51ef41d

File tree

4 files changed

+40
-9
lines changed

4 files changed

+40
-9
lines changed

CHANGELOG.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,10 @@
11
# Ruby SAML Changelog
22

3-
### 1.18.0 (???)
3+
### 1.18.0 (Mar 12, 2025)
44
* [#718](https://github.com/SAML-Toolkits/ruby-saml/pull/718/) Add support to retrieve from SAMLResponse the AuthnInstant and AuthnContextClassRef values
55
* [#720](https://github.com/SAML-Toolkits/ruby-saml/pull/720) Fix ambiguous regex warnings
66
* [#715](https://github.com/SAML-Toolkits/ruby-saml/pull/715) Fix typo in SPNameQualifier error text
7+
* [750](https://github.com/SAML-Toolkits/ruby-saml/pull/750) Fix vulnerabilities: CVE-2025-25291, CVE-2025-25292: SAML authentication bypass via Signature Wrapping attack allowed due parser differential. Fix vulnerability: CVE-2025-25293: Potential DOS abusing of compressed messages.
78

89
### 1.17.0 (Sep 10, 2024)
910
* Fix for critical vulnerability CVE-2024-45409: SAML authentication bypass via Incorrect XPath selector

README.md

Lines changed: 28 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,34 @@
77
Minor and patch versions of Ruby SAML may introduce breaking changes. Please read
88
[UPGRADING.md](UPGRADING.md) for guidance on upgrading to new Ruby SAML versions.
99

10-
There is a critical vulnerability affecting ruby-saml < 1.17.0 (CVE-2024-45409). Make sure you are using an updated version. (1.12.3 is safe)
10+
### Pay it Forward: Support RubySAML and Strengthen Open-Source Security
11+
12+
RubySAML is a trusted authentication library used by startups and enterprises alike.
13+
14+
But security doesn't happen in a vacuum. Vulnerabilities in authentication libraries can
15+
have widespread consequences. Maintaining open-source security requires continuous
16+
effort, expertise, and funding. By supporting RubySAML, you’re not just securing your
17+
own systems—you’re strengthening auth security globally.
18+
19+
#### How you can help
20+
21+
* Sponsor RubySAML: [GitHub Sponsors](https://github.com/sponsors/SAML-Toolkits)
22+
* Contribute to secure-by-design improvements
23+
* Responsibly report vulnerabilities (see "Vulnerability Reporting" above)
24+
25+
Security is a shared responsibility. If RubySAML has helped your organization, please
26+
consider giving back. Together, we can keep authentication secure.
27+
28+
### Sponsors
29+
30+
Thanks to the following sponsors for securing the open source ecosystem,
31+
32+
[<img alt="84codes" src="https://avatars.githubusercontent.com/u/5353257" width="75px">](https://www.84codes.com)
33+
34+
35+
## Vulnerabilities
36+
37+
There are critical vulnerabilities affecting ruby-saml < 1.18.0, two of them allows SAML authentication bypass (CVE-2025-25291, CVE-2025-25292, CVE-2025-25293). Please upgrade to a fixed version (1.18.0)
1138

1239
## Overview
1340

@@ -61,12 +88,6 @@ But there are other scenarios, like a SaaS app where the administrator of the ap
6188
delegates this functionality to other users. In this case, extra precautions should
6289
be taken in order to validate such URL inputs and avoid attacks like SSRF.
6390

64-
### Sponsors
65-
66-
Thanks to the following sponsors for their support:
67-
68-
[<img alt="84codes" src="https://avatars.githubusercontent.com/u/5353257" width="50px">](https://www.84codes.com)
69-
7091
## Getting Started
7192

7293
In order to use Ruby SAML you will need to install the gem (either manually or using Bundler),

UPGRADING.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,14 @@
11
# Ruby SAML Migration Guide
22

3+
## Updating from 1.17.x to 1.18.0
4+
5+
Version `1.18.0` changes the way the toolkit validates SAML signatures. There is a new order
6+
how validation happens in the toolkit and also the toolkit by default will check malformed doc
7+
when parsing a SAML Message (`settings.check_malformed_doc`).
8+
9+
The SignedDocument class defined at xml_security.rb experienced several changes.
10+
We don't expect compatibilty issues if you use the main methods offered by ruby-saml, but if you use a fork or customized usage, is possible that you need to adapt your code.
11+
312
## Updating from 1.12.x to 1.13.0
413

514
Version `1.13.0` adds `settings.idp_sso_service_binding` and `settings.idp_slo_service_binding`, and

lib/onelogin/ruby-saml/version.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
module OneLogin
22
module RubySaml
3-
VERSION = '1.17.0'
3+
VERSION = '1.18.0'
44
end
55
end

0 commit comments

Comments
 (0)