10

CVE-2024-45409

The Ruby SAML library is for implementing the client side of a SAML authorization. Ruby-SAML in <= 12.2 and 1.13.0 <= 1.16.0 does not properly verify the signature of the SAML Response. An unauthenticated attacker with access to any signed saml document (by the IdP) can thus forge a SAML Response/Assertion with arbitrary contents. This would allow the attacker to log in as arbitrary user within the vulnerable system. This vulnerability is fixed in 1.17.0 and 1.12.3.

Data is provided by the National Vulnerability Database (NVD)
OneloginRuby-saml Version < 1.12.3
OneloginRuby-saml Version >= 1.13.0 < 1.17.0
OmniauthOmniauth Saml SwPlatformruby Version <= 1.10.3
OmniauthOmniauth Saml Version2.0.0 SwPlatformruby
OmniauthOmniauth Saml Version2.1.0 SwPlatformruby
GitlabGitlab Version < 16.11.10
GitlabGitlab Version >= 17.0.0 < 17.0.8
GitlabGitlab Version >= 17.1.0 < 17.1.8
GitlabGitlab Version >= 17.2.0 < 17.2.7
GitlabGitlab Version >= 17.3.0 < 17.3.3
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 12.64% 0.937
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
security-advisories@github.com 10 3.9 5.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N
CWE-347 Improper Verification of Cryptographic Signature

The product does not verify, or incorrectly verifies, the cryptographic signature for data.