Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4288-1 | ruby-saml security update |
EUVD |
EUVD-2025-23157 | Ruby SAML DOS vulnerability with large SAML response |
Github GHSA |
GHSA-rrqh-93c8-j966 | Ruby SAML DOS vulnerability with large SAML response |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 31 Jul 2025 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Saml-toolkits
Saml-toolkits ruby-saml |
|
| Vendors & Products |
Saml-toolkits
Saml-toolkits ruby-saml |
Wed, 30 Jul 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 30 Jul 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Ruby SAML library is for implementing the client side of a SAML authorization. In versions 1.18.0 and below, a denial-of-service vulnerability exists in ruby-saml even with the message_max_bytesize setting configured. The vulnerability occurs because the SAML response is validated for Base64 format prior to checking the message size, leading to potential resource exhaustion. This is fixed in version 1.18.1. | |
| Title | Ruby SAML DOS vulnerability with large SAML response | |
| Weaknesses | CWE-400 CWE-770 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-07-30T14:17:41.057Z
Reserved: 2025-07-25T16:19:16.091Z
Link: CVE-2025-54572
Updated: 2025-07-30T14:17:33.379Z
Status : Awaiting Analysis
Published: 2025-07-30T14:15:29.433
Modified: 2025-07-31T18:42:37.870
Link: CVE-2025-54572
No data.
OpenCVE Enrichment
Updated: 2025-07-31T10:09:16Z
Debian DLA
EUVD
Github GHSA