- Description
- ruby-saml provides security assertion markup language (SAML) single sign-on (SSO) for Ruby. Prior to versions 1.12.4 and 1.18.0, ruby-saml is susceptible to remote Denial of Service (DoS) with compressed SAML responses. ruby-saml uses zlib to decompress SAML responses in case they're compressed. It is possible to bypass the message size check with a compressed assertion since the message size is checked before inflation and not after. This issue may lead to remote Denial of Service (DoS). Versions 1.12.4 and 1.18.0 fix the issue.
- Source
- security-advisories@github.com
- NVD status
- Analyzed
- Products
- omniauth_saml, ruby-saml
CVSS 4.0
- Type
- Secondary
- Base score
- 7.7
- Impact score
- -
- Exploitability score
- -
- Vector string
- CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
- Severity
- HIGH
CVSS 3.1
- Type
- Primary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
- Severity
- HIGH
- security-advisories@github.com
- CWE-400
- Hype score
- Not currently trending
🚨 CVE-2025-25293 🔴 HIGH (7.7) 🏢 SAML-Toolkits - ruby-saml 🏗️ < 1.12.4 🔗 https://t.co/jm2mbhGnuH 🔗 https://t.co/h8YdAeYu74 🔗 https://t.co/K9gKP28jDt 🔗 https://t.co/YW3NyuNYro 🔗 https://t.co/f8aBRIeY8r 🔗 https://t.co/EXTDB5lbdj #CyberCron #VulnAlert #InfoSec https://t.
@cybercronai
14 Mar 2025
27 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 GitHub Uncovers Critical Ruby-SAML Vulnerabilities! 🚨 Two high-severity flaws (CVE-2025-25291 & CVE-2025-25292, CVSS 8.8) allow attackers to bypass authentication and gain unauthorized access! 😨 🔴 Also found: CVE-2025-25293 (CVSS 7.7) enabling DoS attacks via compress
@cybrhoodsentinl
13 Mar 2025
31 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-25293 ruby-saml provides security assertion markup language (SAML) single sign-on (SSO) for Ruby. Prior to versions 1.12.4 and 1.18.0, ruby-saml is susceptible to remote De… https://t.co/h4bky8hVFL
@CVEnew
12 Mar 2025
262 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:omniauth:omniauth_saml:*:*:*:*:*:ruby:*:*",
"vulnerable": true,
"matchCriteriaId": "AB57A4CB-E546-42D7-AB8D-D86E979C80C1",
"versionEndExcluding": "1.10.6"
},
{
"criteria": "cpe:2.3:a:omniauth:omniauth_saml:*:*:*:*:*:ruby:*:*",
"vulnerable": true,
"matchCriteriaId": "58E37D56-71A9-417D-B0DD-EBDC2EA3855F",
"versionEndExcluding": "2.1.3",
"versionStartIncluding": "2.0.0"
},
{
"criteria": "cpe:2.3:a:omniauth:omniauth_saml:*:*:*:*:*:ruby:*:*",
"vulnerable": true,
"matchCriteriaId": "9549FF35-D7A0-446A-87C8-552C8D89CD92",
"versionEndExcluding": "2.2.3",
"versionStartIncluding": "2.2.0"
},
{
"criteria": "cpe:2.3:a:onelogin:ruby-saml:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "EB0F9A57-0F32-4ECC-97B4-1F87DD7D7FD6",
"versionEndExcluding": "1.12.4"
},
{
"criteria": "cpe:2.3:a:onelogin:ruby-saml:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "455E8699-D6C2-4BFF-B4FD-2329E0F1E910",
"versionEndExcluding": "1.18.0",
"versionStartIncluding": "1.13.0"
}
],
"operator": "OR"
}
]
}
]