Vulnerabilities (CVE)

Filtered by vendor Onelogin Subscribe
Filtered by product Ruby-saml
Total 6 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2025-25292 2 Omniauth, Onelogin 2 Omniauth Saml, Ruby-saml 2025-08-01 N/A 9.8 CRITICAL
ruby-saml provides security assertion markup language (SAML) single sign-on (SSO) for Ruby. An authentication bypass vulnerability was found in ruby-saml prior to versions 1.12.4 and 1.18.0 due to a parser differential. ReXML and Nokogiri parse XML differently, the parsers can generate entirely different document structures from the same XML input. That allows an attacker to be able to execute a Signature Wrapping attack. This issue may lead to authentication bypass. Versions 1.12.4 and 1.18.0 contain a patch for the issue.
CVE-2025-25293 2 Omniauth, Onelogin 2 Omniauth Saml, Ruby-saml 2025-08-01 N/A 7.5 HIGH
ruby-saml provides security assertion markup language (SAML) single sign-on (SSO) for Ruby. Prior to versions 1.12.4 and 1.18.0, ruby-saml is susceptible to remote Denial of Service (DoS) with compressed SAML responses. ruby-saml uses zlib to decompress SAML responses in case they're compressed. It is possible to bypass the message size check with a compressed assertion since the message size is checked before inflation and not after. This issue may lead to remote Denial of Service (DoS). Versions 1.12.4 and 1.18.0 fix the issue.
CVE-2016-5697 1 Onelogin 1 Ruby-saml 2025-04-20 5.0 MEDIUM 7.5 HIGH
Ruby-saml before 1.3.0 allows attackers to perform XML signature wrapping attacks via unspecified vectors.
CVE-2015-20108 1 Onelogin 1 Ruby-saml 2025-01-14 N/A 9.8 CRITICAL
xml_security.rb in the ruby-saml gem before 1.0.0 for Ruby allows XPath injection and code execution because prepared statements are not used.
CVE-2024-45409 3 Gitlab, Omniauth, Onelogin 3 Gitlab, Omniauth Saml, Ruby-saml 2024-11-21 N/A 10.0 CRITICAL
The Ruby SAML library is for implementing the client side of a SAML authorization. Ruby-SAML in <= 12.2 and 1.13.0 <= 1.16.0 does not properly verify the signature of the SAML Response. An unauthenticated attacker with access to any signed saml document (by the IdP) can thus forge a SAML Response/Assertion with arbitrary contents. This would allow the attacker to log in as arbitrary user within the vulnerable system. This vulnerability is fixed in 1.17.0 and 1.12.3.
CVE-2017-11428 1 Onelogin 1 Ruby-saml 2024-11-21 7.5 HIGH 7.7 HIGH
OneLogin Ruby-SAML 1.6.0 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.