GHSA-94hm-8q65-rmxm

Suggest an improvement
Source
https://github.com/advisories/GHSA-94hm-8q65-rmxm
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2019/07/GHSA-94hm-8q65-rmxm/GHSA-94hm-8q65-rmxm.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-94hm-8q65-rmxm
Aliases
Published
2019-07-05T21:11:43Z
Modified
2023-11-01T04:47:31.014412Z
Severity
  • 7.7 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N CVSS Calculator
Summary
OmniAuth-SAML authentication bypass via incorrect XML canonicalization and DOM traversal
Details

OmniAuth OmniAuth-SAML 1.9.0 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.

Database specific
{
    "nvd_published_at": null,
    "cwe_ids": [
        "CWE-287"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2020-06-16T21:27:27Z"
}
References

Affected packages

RubyGems / omniauth-saml

Package

Name
omniauth-saml
Purl
pkg:gem/omniauth-saml

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.10.0

Affected versions

0.*

0.9.0
0.9.1
0.9.2

1.*

1.0.0
1.1.0
1.2.0
1.3.0
1.3.1
1.4.0
1.4.1
1.4.2
1.5.0
1.6.0
1.7.0
1.8.0
1.8.1
1.9.0