File tree 1 file changed +36
-0
lines changed
1 file changed +36
-0
lines changed Original file line number Diff line number Diff line change
1
+ ---
2
+ layout : advisory
3
+ title : ' CVE-2024-45409 (omniauth-saml): omniauth-saml vulnerable to Improper Verification
4
+ of Cryptographic Signature'
5
+ comments : false
6
+ categories :
7
+ - omniauth-saml
8
+ advisory :
9
+ gem : omniauth-saml
10
+ cve : 2024-45409
11
+ ghsa : cvp8-5r8g-fhvq
12
+ url : https://github.com/omniauth/omniauth-saml/security/advisories/GHSA-cvp8-5r8g-fhvq
13
+ title : omniauth-saml vulnerable to Improper Verification of Cryptographic Signature
14
+ date : 2024-09-11
15
+ description : |
16
+ ruby-saml, the dependent SAML gem of omniauth-saml has a signature
17
+ wrapping vulnerability in <= v1.12.0 and v1.13.0 to v1.16.0 , see
18
+ https://github.com/SAML-Toolkits/ruby-saml/security/advisories/GHSA-jw9c-mfg7-9rx2
19
+
20
+ As a result, omniauth-saml created a
21
+ [new release](https://github.com/omniauth/omniauth-saml/releases)
22
+ by upgrading ruby-saml to the patched versions v1.17.
23
+ cvss_v3 : 10.0
24
+ patched_versions :
25
+ - " >= 1.10.5, < 2.0.0"
26
+ - " ~> 2.1.2"
27
+ - " >= 2.2.1"
28
+ related :
29
+ ghsa :
30
+ - https://github.com/omniauth/omniauth-saml/security/advisories/GHSA-cvp8-5r8g-fhvq
31
+ - https://github.com/SAML-Toolkits/ruby-saml/security/advisories/GHSA-jw9c-mfg7-9rx2
32
+ - https://github.com/advisories/GHSA-cvp8-5r8g-fhvq
33
+ url :
34
+ - https://github.com/omniauth/omniauth-saml/commit/4274e9d57e65f2dcaae4aa3b2accf831494f2ddd
35
+ - https://github.com/omniauth/omniauth-saml/commit/6c681fd082ab3daf271821897a40ab3417382e29
36
+ ---
You can’t perform that action at this time.
0 commit comments