Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
15 changes: 15 additions & 0 deletions gems/omniauth-saml/CVE-2024-45409.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,15 @@
---
gem: omniauth-saml
cve: 2024-45409
ghsa: jw9c-mfg7-9rx2
url: https://github.com/omniauth/omniauth-saml/commit/4274e9d57e65f2dcaae4aa3b2accf831494f2ddd
title: SAML authentication bypass via Incorrect XPath selector
date: 2024-08-28
description: |
Ruby-SAML in <= 12.2 and 1.13.0 <= 1.16.0 does not properly verify the signature of the SAML Response.
An unauthenticated attacker with access to any signed saml document (by the IdP) can thus forge a SAML
Response/Assertion with arbitrary contents. This would allow the attacker to log in as arbitrary user within
the vulnerable system.
cvss_v3: 10.0
patched_versions:
- ">= 2.2.0"
16 changes: 16 additions & 0 deletions gems/ruby-saml/CVE-2024-45409.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,16 @@
---
gem: ruby-saml
cve: 2024-45409
ghsa: jw9c-mfg7-9rx2
url: https://github.com/SAML-Toolkits/ruby-saml/commit/1ec5392bc506fe43a02dbb66b68741051c5ffeae
title: SAML authentication bypass via Incorrect XPath selector
date: 2024-08-28
description: |
Ruby-SAML in <= 12.2 and 1.13.0 <= 1.16.0 does not properly verify the signature of the SAML Response.
An unauthenticated attacker with access to any signed saml document (by the IdP) can thus forge a SAML
Response/Assertion with arbitrary contents. This would allow the attacker to log in as arbitrary user within
the vulnerable system.
cvss_v3: 10.0
patched_versions:
- "~> 1.12.3"
- ">= 1.17.0"
Loading