Vulnerabilities (CVE)

Filtered by vendor Omniauth Subscribe
Total 5 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2017-11430 1 Omniauth 1 Omniauth Saml 2024-09-20 7.5 HIGH 9.8 CRITICAL
OmniAuth OmnitAuth-SAML 1.9.0 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.
CVE-2024-45409 3 Gitlab, Omniauth, Onelogin 3 Gitlab, Omniauth Saml, Ruby-saml 2024-09-20 N/A 9.8 CRITICAL
The Ruby SAML library is for implementing the client side of a SAML authorization. Ruby-SAML in <= 12.2 and 1.13.0 <= 1.16.0 does not properly verify the signature of the SAML Response. An unauthenticated attacker with access to any signed saml document (by the IdP) can thus forge a SAML Response/Assertion with arbitrary contents. This would allow the attacker to log in as arbitrary user within the vulnerable system. This vulnerability is fixed in 1.17.0 and 1.12.3.
CVE-2020-36599 1 Omniauth 1 Omniauth 2024-06-18 N/A 9.8 CRITICAL
lib/omniauth/failure_endpoint.rb in OmniAuth before 1.9.2 (and before 2.0) does not escape the message_key value.
CVE-2015-9284 1 Omniauth 1 Omniauth 2024-02-14 6.8 MEDIUM 8.8 HIGH
The request phase of the OmniAuth Ruby gem (1.9.1 and earlier) is vulnerable to Cross-Site Request Forgery when used as part of the Ruby on Rails framework, allowing accounts to be connected without user intent, user interaction, or feedback to the user. This permits a secondary account to be able to sign into the web application as the primary account.
CVE-2017-18076 2 Debian, Omniauth 2 Debian Linux, Omniauth 2024-02-04 5.0 MEDIUM 7.5 HIGH
In strategy.rb in OmniAuth before 1.3.2, the authenticity_token value is improperly protected because POST (in addition to GET) parameters are stored in the session and become available in the environment of the callback phase.