CVE-2024-45409

The Ruby SAML library is for implementing the client side of a SAML authorization. Ruby-SAML in <= 12.2 and 1.13.0 <= 1.16.0 does not properly verify the signature of the SAML Response. An unauthenticated attacker with access to any signed saml document (by the IdP) can thus forge a SAML Response/Assertion with arbitrary contents. This would allow the attacker to log in as arbitrary user within the vulnerable system. This vulnerability is fixed in 1.17.0 and 1.12.3.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
10 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N
GitHub_MCNA
10 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N
CISA-ADPADP
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 94%
VendorProductVersion
oneloginruby-saml
𝑥
< 1.12.3
oneloginruby-saml
1.13.0 ≤
𝑥
< 1.17.0
omniauthomniauth_saml
𝑥
≤ 1.10.3
omniauthomniauth_saml
2.0.0
omniauthomniauth_saml
2.1.0
gitlabgitlab
𝑥
< 16.11.10
gitlabgitlab
17.0.0 ≤
𝑥
< 17.0.8
gitlabgitlab
17.1.0 ≤
𝑥
< 17.1.8
gitlabgitlab
17.2.0 ≤
𝑥
< 17.2.7
gitlabgitlab
17.3.0 ≤
𝑥
< 17.3.3
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
ruby-saml
bullseye
vulnerable
bullseye (security)
1.11.0-1+deb11u2
fixed
bookworm
1.13.0-1+deb12u1
fixed
bookworm (security)
1.13.0-1+deb12u1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
ruby-saml
oracular
Fixed 1.15.0-1ubuntu0.24.10.1
released
noble
Fixed 1.15.0-1ubuntu0.24.04.1
released
jammy
Fixed 1.13.0-1ubuntu0.1
released
focal
Fixed 1.11.0-1ubuntu0.1
released
bionic
Fixed 1.7.2-1ubuntu0.1~esm1
released
xenial
Fixed 1.1.2-1ubuntu1+esm1
released