- Description
- The Ruby SAML library is for implementing the client side of a SAML authorization. Ruby-SAML in <= 12.2 and 1.13.0 <= 1.16.0 does not properly verify the signature of the SAML Response. An unauthenticated attacker with access to any signed saml document (by the IdP) can thus forge a SAML Response/Assertion with arbitrary contents. This would allow the attacker to log in as arbitrary user within the vulnerable system. This vulnerability is fixed in 1.17.0 and 1.12.3.
- Source
- security-advisories@github.com
- NVD status
- Analyzed
- Products
- ruby-saml, omniauth_saml, gitlab
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
- security-advisories@github.com
- CWE-347
- Hype score
- Not currently trending
Actively exploited CVE : CVE-2024-45409
@transilienceai
16 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Ruby SAML CVE-2024-45409: As bad as it gets and hiding in plain sight #RubySAML #CVE202445409 #SecurityFlaw #WorstCaseScenario #OpenSourceVulnerability https://t.co/0wJsz891FD
@reverseame
9 Dec 2024
171 Impressions
0 Retweets
1 Like
1 Bookmark
0 Replies
0 Quotes
Ruby SAML CVE-2024-45409: As bad as it gets and hiding in plain sight https://t.co/w9NMnJa2oo
@_r_netsec
13 Nov 2024
931 Impressions
4 Retweets
12 Likes
4 Bookmarks
0 Replies
0 Quotes
Ruby-SAML / GitLab Authentication Bypass (CVE-2024-45409) by @rootxharsh & @iamnoooob https://t.co/nQ6mY8qshm #BBRENewsletter82 https://t.co/7iyxufMuN4
@gregxsunday
31 Oct 2024
179 Impressions
0 Retweets
4 Likes
0 Bookmarks
0 Replies
0 Quotes
Actively exploited CVE : CVE-2024-45409
@transilienceai
30 Oct 2024
9 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2024-45409
@transilienceai
29 Oct 2024
8 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
#Vulnerability #CVE202445409 GitLab Releases Critical Security Patch for CVE-2024-45409 (CVSS 10) Vulnerability https://t.co/ZueoB9rcaL
@Komodosec
25 Oct 2024
37 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Actively exploited CVE : CVE-2024-45409
@transilienceai
25 Oct 2024
17 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2024-45409
@transilienceai
23 Oct 2024
17 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2024-45409
@transilienceai
20 Oct 2024
14 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
#Vulnerability #CVE202445409 CVE-2024-45409 (CVSS 10): Critical Ruby-SAML Flaw Leaves User Accounts Exposed https://t.co/jSVQTpbD78
@Komodosec
19 Oct 2024
26 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-45409: Gitlab SAML Authentication Bypass Vulnerability. Account takeover was possible due to insufficient verification of SAML response. https://t.co/SqGej3pZOE
@hackyboiz
19 Oct 2024
1500 Impressions
7 Retweets
21 Likes
12 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:onelogin:ruby-saml:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DF41BEEE-FC5B-4728-B9BE-0B58C04F547E",
"versionEndExcluding": "1.12.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:onelogin:ruby-saml:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ADBA67BE-BC31-48C0-A36F-9431814178C0",
"versionEndExcluding": "1.17.0",
"versionStartIncluding": "1.13.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:omniauth:omniauth_saml:*:*:*:*:*:ruby:*:*",
"matchCriteriaId": "6D978907-97A8-4EF4-BF81-FE8702C24745",
"versionEndIncluding": "1.10.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:omniauth:omniauth_saml:2.0.0:*:*:*:*:ruby:*:*",
"matchCriteriaId": "527AEDE3-F8EB-4C38-AF51-3B679AC4E336",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:omniauth:omniauth_saml:2.1.0:*:*:*:*:ruby:*:*",
"matchCriteriaId": "3F307538-4D4D-4DD1-A9A0-F4D06E20163E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7000556E-4EBB-4B99-84B1-A2EEA709311C",
"versionEndExcluding": "16.11.10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3B47FDB0-B642-4E50-B0B6-1D71545FE917",
"versionEndExcluding": "17.0.8",
"versionStartIncluding": "17.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*",
"matchCriteriaId": "86B327A7-22C7-488F-ABA6-3AC90EF07D04",
"versionEndExcluding": "17.1.8",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E831CA83-DDA9-4F47-BCF8-2CBB7E74C9DC",
"versionEndExcluding": "17.2.7",
"versionStartIncluding": "17.2.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*",
"matchCriteriaId": "60003658-012F-4DB8-9D8F-8E48C14CA0C4",
"versionEndExcluding": "17.3.3",
"versionStartIncluding": "17.3.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]