File tree Expand file tree Collapse file tree 1 file changed +36
-0
lines changed Expand file tree Collapse file tree 1 file changed +36
-0
lines changed Original file line number Diff line number Diff line change 1+ ---
2+ layout : advisory
3+ title : ' CVE-2024-45409 (omniauth-saml): omniauth-saml vulnerable to Improper Verification
4+ of Cryptographic Signature'
5+ comments : false
6+ categories :
7+ - omniauth-saml
8+ advisory :
9+ gem : omniauth-saml
10+ cve : 2024-45409
11+ ghsa : cvp8-5r8g-fhvq
12+ url : https://github.com/omniauth/omniauth-saml/security/advisories/GHSA-cvp8-5r8g-fhvq
13+ title : omniauth-saml vulnerable to Improper Verification of Cryptographic Signature
14+ date : 2024-09-11
15+ description : |
16+ ruby-saml, the dependent SAML gem of omniauth-saml has a signature
17+ wrapping vulnerability in <= v1.12.0 and v1.13.0 to v1.16.0 , see
18+ https://github.com/SAML-Toolkits/ruby-saml/security/advisories/GHSA-jw9c-mfg7-9rx2
19+
20+ As a result, omniauth-saml created a
21+ [new release](https://github.com/omniauth/omniauth-saml/releases)
22+ by upgrading ruby-saml to the patched versions v1.17.
23+ cvss_v3 : 10.0
24+ patched_versions :
25+ - " >= 1.10.5, < 2.0.0"
26+ - " ~> 2.1.2"
27+ - " >= 2.2.1"
28+ related :
29+ ghsa :
30+ - https://github.com/omniauth/omniauth-saml/security/advisories/GHSA-cvp8-5r8g-fhvq
31+ - https://github.com/SAML-Toolkits/ruby-saml/security/advisories/GHSA-jw9c-mfg7-9rx2
32+ - https://github.com/advisories/GHSA-cvp8-5r8g-fhvq
33+ url :
34+ - https://github.com/omniauth/omniauth-saml/commit/4274e9d57e65f2dcaae4aa3b2accf831494f2ddd
35+ - https://github.com/omniauth/omniauth-saml/commit/6c681fd082ab3daf271821897a40ab3417382e29
36+ ---
You can’t perform that action at this time.
0 commit comments