Skip to content

Commit 4858b8b

Browse files
Adrian-HirtRubySec CI
authored and
RubySec CI
committed
Updated advisory posts against rubysec/ruby-advisory-db@233c6ae
1 parent 9d61896 commit 4858b8b

File tree

3 files changed

+123
-0
lines changed

3 files changed

+123
-0
lines changed
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,41 @@
1+
---
2+
layout: advisory
3+
title: 'CVE-2025-25291 (ruby-saml): Ruby SAML allows a SAML authentication bypass
4+
due to DOCTYPE handling (parser differential)'
5+
comments: false
6+
categories:
7+
- ruby-saml
8+
advisory:
9+
gem: ruby-saml
10+
cve: 2025-25291
11+
ghsa: 4vc4-m8qh-g8jm
12+
url: https://github.com/SAML-Toolkits/ruby-saml/security/advisories/GHSA-4vc4-m8qh-g8jm
13+
title: Ruby SAML allows a SAML authentication bypass due to DOCTYPE handling (parser
14+
differential)
15+
date: 2025-03-12
16+
description: |-
17+
### Summary
18+
An authentication bypass vulnerability was found in ruby-saml due to a parser differential.
19+
ReXML and Nokogiri parse XML differently, the parsers can generate entirely
20+
different document structures from the same XML input. That allows an attacker
21+
to be able to execute a Signature Wrapping attack.
22+
23+
### Impact
24+
This issue may lead to authentication bypass.
25+
cvss_v4: 8.8
26+
patched_versions:
27+
- "~> 1.12.4"
28+
- ">= 1.18.0"
29+
related:
30+
url:
31+
- https://github.com/SAML-Toolkits/ruby-saml/security/advisories/GHSA-4vc4-m8qh-g8jm
32+
- https://github.com/SAML-Toolkits/ruby-saml/commit/e9c1cdbd0f9afa467b585de279db0cbd0fb8ae97
33+
- https://github.com/omniauth/omniauth-saml/security/advisories/GHSA-hw46-3hmr-x9xv
34+
- https://nvd.nist.gov/vuln/detail/CVE-2025-25291
35+
- https://github.com/SAML-Toolkits/ruby-saml/commit/e76c5b36bac40aedbf1ba7ffaaf495be63328cd9
36+
- https://about.gitlab.com/releases/2025/03/12/patch-release-gitlab-17-9-2-released
37+
- https://github.blog/security/sign-in-as-anyone-bypassing-saml-sso-authentication-with-parser-differentials
38+
- https://github.com/SAML-Toolkits/ruby-saml/releases/tag/v1.12.4
39+
- https://github.com/SAML-Toolkits/ruby-saml/releases/tag/v1.18.0
40+
- https://github.com/advisories/GHSA-4vc4-m8qh-g8jm
41+
---
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,41 @@
1+
---
2+
layout: advisory
3+
title: 'CVE-2025-25292 (ruby-saml): Ruby SAML allows a SAML authentication bypass
4+
due to namespace handling (parser differential)'
5+
comments: false
6+
categories:
7+
- ruby-saml
8+
advisory:
9+
gem: ruby-saml
10+
cve: 2025-25292
11+
ghsa: 754f-8gm6-c4r2
12+
url: https://github.com/SAML-Toolkits/ruby-saml/security/advisories/GHSA-754f-8gm6-c4r2
13+
title: Ruby SAML allows a SAML authentication bypass due to namespace handling (parser
14+
differential)
15+
date: 2025-03-12
16+
description: |-
17+
### Summary
18+
An authentication bypass vulnerability was found in ruby-saml due to a parser differential.
19+
ReXML and Nokogiri parse XML differently, the parsers can generate entirely
20+
different document structures from the same XML input. That allows an
21+
attacker to be able to execute a Signature Wrapping attack.
22+
23+
### Impact
24+
This issue may lead to authentication bypass.
25+
cvss_v4: 8.8
26+
patched_versions:
27+
- "~> 1.12.4"
28+
- ">= 1.18.0"
29+
related:
30+
url:
31+
- https://github.com/SAML-Toolkits/ruby-saml/security/advisories/GHSA-754f-8gm6-c4r2
32+
- https://github.com/omniauth/omniauth-saml/security/advisories/GHSA-hw46-3hmr-x9xv
33+
- https://github.com/SAML-Toolkits/ruby-saml/commit/e76c5b36bac40aedbf1ba7ffaaf495be63328cd9
34+
- https://github.com/SAML-Toolkits/ruby-saml/commit/e9c1cdbd0f9afa467b585de279db0cbd0fb8ae97
35+
- https://about.gitlab.com/releases/2025/03/12/patch-release-gitlab-17-9-2-released
36+
- https://github.com/SAML-Toolkits/ruby-saml/releases/tag/v1.12.4
37+
- https://github.com/SAML-Toolkits/ruby-saml/releases/tag/v1.18.0
38+
- https://nvd.nist.gov/vuln/detail/CVE-2025-25292
39+
- https://github.blog/security/sign-in-as-anyone-bypassing-saml-sso-authentication-with-parser-differentials
40+
- https://github.com/advisories/GHSA-754f-8gm6-c4r2
41+
---
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,41 @@
1+
---
2+
layout: advisory
3+
title: 'CVE-2025-25293 (ruby-saml): Ruby SAML allows remote Denial of Service (DoS)
4+
with compressed SAML responses'
5+
comments: false
6+
categories:
7+
- ruby-saml
8+
advisory:
9+
gem: ruby-saml
10+
cve: 2025-25293
11+
ghsa: 92rq-c8cf-prrq
12+
url: https://github.com/SAML-Toolkits/ruby-saml/security/advisories/GHSA-92rq-c8cf-prrq
13+
title: Ruby SAML allows remote Denial of Service (DoS) with compressed SAML responses
14+
date: 2025-03-12
15+
description: |-
16+
### Summary
17+
ruby-saml is susceptible to remote Denial of Service (DoS) with compressed SAML responses.
18+
19+
Ruby-saml uses zlib to decompress SAML responses in case they're compressed.
20+
It is possible to bypass the message size check with a compressed assertion
21+
since the message size is checked before inflation and not after.
22+
23+
### Impact
24+
This issue may lead to remote Denial of Service (DoS).
25+
cvss_v4: 8.8
26+
patched_versions:
27+
- "~> 1.12.4"
28+
- ">= 1.18.0"
29+
related:
30+
url:
31+
- https://github.com/SAML-Toolkits/ruby-saml/security/advisories/GHSA-92rq-c8cf-prrq
32+
- https://github.com/SAML-Toolkits/ruby-saml/commit/acac9e9cc0b9a507882c614f25d41f8b47be349a
33+
- https://github.com/omniauth/omniauth-saml/security/advisories/GHSA-hw46-3hmr-x9xv
34+
- https://nvd.nist.gov/vuln/detail/CVE-2025-25293
35+
- https://github.com/SAML-Toolkits/ruby-saml/commit/e2da4c6dae7dc01a4d9cd221395140a67e2b3eb1
36+
- https://about.gitlab.com/releases/2025/03/12/patch-release-gitlab-17-9-2-released
37+
- https://github.blog/security/sign-in-as-anyone-bypassing-saml-sso-authentication-with-parser-differentials
38+
- https://github.com/SAML-Toolkits/ruby-saml/releases/tag/v1.12.4
39+
- https://github.com/SAML-Toolkits/ruby-saml/releases/tag/v1.18.0
40+
- https://github.com/advisories/GHSA-92rq-c8cf-prrq
41+
---

0 commit comments

Comments
 (0)