The Ruby SAML library is for implementing the client side of a SAML authorization. Ruby-SAML in <= 12.2 and 1.13.0 <= 1.16.0 does not properly verify the signature of the SAML Response. An unauthenticated attacker with access to any signed saml document (by the IdP) can thus forge a SAML Response/Assertion with arbitrary contents. This would allow the attacker to log in as arbitrary user within the vulnerable system. This vulnerability is fixed in 1.17.0 and 1.12.3.
History

Wed, 11 Sep 2024 21:15:00 +0000


Tue, 10 Sep 2024 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Omniauth
Omniauth omniauth-saml
Onelogin
Onelogin ruby-saml
CPEs cpe:2.3:a:omniauth:omniauth-saml:*:*:*:*:*:*:*:*
cpe:2.3:a:onelogin:ruby-saml:*:*:*:*:*:*:*:*
Vendors & Products Omniauth
Omniauth omniauth-saml
Onelogin
Onelogin ruby-saml
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 10 Sep 2024 19:00:00 +0000

Type Values Removed Values Added
Description The Ruby SAML library is for implementing the client side of a SAML authorization. Ruby-SAML in <= 12.2 and 1.13.0 <= 1.16.0 does not properly verify the signature of the SAML Response. An unauthenticated attacker with access to any signed saml document (by the IdP) can thus forge a SAML Response/Assertion with arbitrary contents. This would allow the attacker to log in as arbitrary user within the vulnerable system. This vulnerability is fixed in 1.17.0 and 1.12.3.
Title The Ruby SAML library vulnerable to a SAML authentication bypass via Incorrect XPath selector
Weaknesses CWE-347
References
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-09-10T18:50:12.965Z

Updated: 2024-09-19T04:35:38.881Z

Reserved: 2024-08-28T20:21:32.804Z

Link: CVE-2024-45409

cve-icon Vulnrichment

Updated: 2024-09-19T04:35:38.881Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-09-10T19:15:22.030

Modified: 2024-09-11T21:15:10.763

Link: CVE-2024-45409

cve-icon Redhat

No data.