Skip to content

Commit d3b8665

Browse files
postmodernRubySec CI
authored and
RubySec CI
committed
Updated advisory posts against rubysec/ruby-advisory-db@23ff48f
1 parent 87b4085 commit d3b8665

File tree

1 file changed

+36
-0
lines changed

1 file changed

+36
-0
lines changed
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
---
2+
layout: advisory
3+
title: 'CVE-2024-45409 (omniauth-saml): omniauth-saml vulnerable to Improper Verification
4+
of Cryptographic Signature'
5+
comments: false
6+
categories:
7+
- omniauth-saml
8+
advisory:
9+
gem: omniauth-saml
10+
cve: 2024-45409
11+
ghsa: cvp8-5r8g-fhvq
12+
url: https://github.com/omniauth/omniauth-saml/security/advisories/GHSA-cvp8-5r8g-fhvq
13+
title: omniauth-saml vulnerable to Improper Verification of Cryptographic Signature
14+
date: 2024-09-11
15+
description: |
16+
ruby-saml, the dependent SAML gem of omniauth-saml has a signature
17+
wrapping vulnerability in <= v1.12.0 and v1.13.0 to v1.16.0 , see
18+
https://github.com/SAML-Toolkits/ruby-saml/security/advisories/GHSA-jw9c-mfg7-9rx2
19+
20+
As a result, omniauth-saml created a
21+
[new release](https://github.com/omniauth/omniauth-saml/releases)
22+
by upgrading ruby-saml to the patched versions v1.17.
23+
cvss_v3: 10.0
24+
patched_versions:
25+
- ">= 1.10.5, < 2.0.0"
26+
- "~> 2.1.2"
27+
- ">= 2.2.1"
28+
related:
29+
ghsa:
30+
- https://github.com/omniauth/omniauth-saml/security/advisories/GHSA-cvp8-5r8g-fhvq
31+
- https://github.com/SAML-Toolkits/ruby-saml/security/advisories/GHSA-jw9c-mfg7-9rx2
32+
- https://github.com/advisories/GHSA-cvp8-5r8g-fhvq
33+
url:
34+
- https://github.com/omniauth/omniauth-saml/commit/4274e9d57e65f2dcaae4aa3b2accf831494f2ddd
35+
- https://github.com/omniauth/omniauth-saml/commit/6c681fd082ab3daf271821897a40ab3417382e29
36+
---

0 commit comments

Comments
 (0)