10
CVE-2024-45409
- EPSS 12.64%
- Published 10.09.2024 19:15:22
- Last modified 21.11.2024 09:37:44
- Source security-advisories@github.com
- Teams watchlist Login
- Open Login
The Ruby SAML library is for implementing the client side of a SAML authorization. Ruby-SAML in <= 12.2 and 1.13.0 <= 1.16.0 does not properly verify the signature of the SAML Response. An unauthenticated attacker with access to any signed saml document (by the IdP) can thus forge a SAML Response/Assertion with arbitrary contents. This would allow the attacker to log in as arbitrary user within the vulnerable system. This vulnerability is fixed in 1.17.0 and 1.12.3.
Data is provided by the National Vulnerability Database (NVD)
Omniauth ≫ Omniauth Saml SwPlatformruby Version <= 1.10.3
Omniauth ≫ Omniauth Saml Version2.0.0 SwPlatformruby
Omniauth ≫ Omniauth Saml Version2.1.0 SwPlatformruby
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 12.64% | 0.937 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
security-advisories@github.com | 10 | 3.9 | 5.8 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N
|
CWE-347 Improper Verification of Cryptographic Signature
The product does not verify, or incorrectly verifies, the cryptographic signature for data.