Arbitrary Command Injection Affecting ruby-saml package, versions <1.0.0-1


Severity

Recommended
0.0
critical
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.31% (71st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Arbitrary Command Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIAN13-RUBYSAML-5695113
  • published30 May 2023
  • disclosed27 May 2023

Introduced: 27 May 2023

CVE-2015-20108  (opens in a new tab)
CWE-77  (opens in a new tab)

How to fix?

Upgrade Debian:13 ruby-saml to version 1.0.0-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream ruby-saml package and not the ruby-saml package as distributed by Debian. See How to fix? for Debian:13 relevant fixed versions and status.

xml_security.rb in the ruby-saml gem before 1.0.0 for Ruby allows XPath injection and code execution because prepared statements are not used.

CVSS Base Scores

version 3.1