File tree Expand file tree Collapse file tree 2 files changed +31
-0
lines changed Expand file tree Collapse file tree 2 files changed +31
-0
lines changed Original file line number Diff line number Diff line change 1+ ---
2+ gem : omniauth-saml
3+ cve : 2024-45409
4+ ghsa : jw9c-mfg7-9rx2
5+ url : https://github.com/omniauth/omniauth-saml/commit/4274e9d57e65f2dcaae4aa3b2accf831494f2ddd
6+ title : SAML authentication bypass via Incorrect XPath selector
7+ date : 2024-08-28
8+ description : |
9+ Ruby-SAML in <= 12.2 and 1.13.0 <= 1.16.0 does not properly verify the signature of the SAML Response.
10+ An unauthenticated attacker with access to any signed saml document (by the IdP) can thus forge a SAML
11+ Response/Assertion with arbitrary contents. This would allow the attacker to log in as arbitrary user within
12+ the vulnerable system.
13+ cvss_v3 : 10.0
14+ patched_versions :
15+ - " >= 2.2.0"
Original file line number Diff line number Diff line change 1+ ---
2+ gem : ruby-saml
3+ cve : 2024-45409
4+ ghsa : jw9c-mfg7-9rx2
5+ url : https://github.com/SAML-Toolkits/ruby-saml/commit/1ec5392bc506fe43a02dbb66b68741051c5ffeae
6+ title : SAML authentication bypass via Incorrect XPath selector
7+ date : 2024-08-28
8+ description : |
9+ Ruby-SAML in <= 12.2 and 1.13.0 <= 1.16.0 does not properly verify the signature of the SAML Response.
10+ An unauthenticated attacker with access to any signed saml document (by the IdP) can thus forge a SAML
11+ Response/Assertion with arbitrary contents. This would allow the attacker to log in as arbitrary user within
12+ the vulnerable system.
13+ cvss_v3 : 10.0
14+ patched_versions :
15+ - " ~> 1.12.3"
16+ - " >= 1.17.0"
You can’t perform that action at this time.
0 commit comments