Improper Verification of Cryptographic Signature Affecting ruby-saml package, versions <1.12.3 >=1.13.0, <1.17.0
Threat Intelligence
Exploit Maturity
Proof of concept
EPSS
16.41% (97th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RUBY-RUBYSAML-7926869
- published 11 Sep 2024
- disclosed 10 Sep 2024
- credit ahacker1
Introduced: 10 Sep 2024
CVE-2024-45409 Open this link in a new tabHow to fix?
Upgrade ruby-saml
to version 1.12.3, 1.17.0 or higher.
Overview
Affected versions of this package are vulnerable to Improper Verification of Cryptographic Signature through the incorrect XPath
selector due to improper verification of the SAML Response signature. An attacker with access to any signed SAML document can forge a SAML Response/Assertion with arbitrary contents and log in as any user within the system.