Filtered by vendor Omniauth Subscriptions
Total 5 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2024-45409 3 Gitlab, Omniauth, Onelogin 4 Gitlab, Omniauth-saml, Omniauth Saml and 1 more 2024-10-16 10 Critical
The Ruby SAML library is for implementing the client side of a SAML authorization. Ruby-SAML in <= 12.2 and 1.13.0 <= 1.16.0 does not properly verify the signature of the SAML Response. An unauthenticated attacker with access to any signed saml document (by the IdP) can thus forge a SAML Response/Assertion with arbitrary contents. This would allow the attacker to log in as arbitrary user within the vulnerable system. This vulnerability is fixed in 1.17.0 and 1.12.3.
CVE-2017-11430 1 Omniauth 1 Omniauth Saml 2024-09-20 N/A
OmniAuth OmnitAuth-SAML 1.9.0 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.
CVE-2015-9284 1 Omniauth 1 Omniauth 2024-08-06 8.8 High
The request phase of the OmniAuth Ruby gem (1.9.1 and earlier) is vulnerable to Cross-Site Request Forgery when used as part of the Ruby on Rails framework, allowing accounts to be connected without user intent, user interaction, or feedback to the user. This permits a secondary account to be able to sign into the web application as the primary account.
CVE-2017-18076 2 Debian, Omniauth 2 Debian Linux, Omniauth 2024-08-05 7.5 High
In strategy.rb in OmniAuth before 1.3.2, the authenticity_token value is improperly protected because POST (in addition to GET) parameters are stored in the session and become available in the environment of the callback phase.
CVE-2020-36599 1 Omniauth 1 Omniauth 2024-08-04 9.8 Critical
lib/omniauth/failure_endpoint.rb in OmniAuth before 1.9.2 (and before 2.0) does not escape the message_key value.