Ruby Library Security Update Advisory (CVE-2024-45409)
Overview
An update has been released to address vulnerabilities in Ruby Library. Users of the affected versions are advised to update to the latest version.
Affected Products
CVE-2024-45409
- Ruby-SAML versions: ~ 1.12.2 (inclusive)
- Ruby-SAML versions: 1.13.0 (inclusive) ~ 1.16.0 (inclusive)
Resolved Vulnerabilities
Ruby-SAML did not properly validate signatures in SAML responses, which could allow an unauthenticated attacker with access to a signed SAML document (by an IdP) to forge SAML responses/assertions with arbitrary content (CVE-2024-45409)
Vulnerability Patches
The following product-specific Vulnerability Patches have been made available with the latest update. If you are using an affected version, Please follow the instructions on the Referenced Sites to update to the latest Vulnerability Patches version.
CVE-2024-45409
- Ruby-SAML version: 1.12.3
- Ruby-SAML version: 1.17.0
References
[1] CVE-2024-45409 Detail
https://nvd.nist.gov/vuln/detail/CVE-2024-45409
[2] SAML authentication bypass via Incorrect XPath selector
https://github.com/SAML-Toolkits/ruby-saml/security/advisories/GHSA-jw9c-mfg7-9rx2