Metrics
Affected Vendors & Products
Thu, 20 Mar 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
cvssV4_0
|
cvssV4_0
|
Tue, 18 Mar 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sat, 15 Mar 2025 21:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Fri, 14 Mar 2025 10:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Wed, 12 Mar 2025 21:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
cvssV4_0
|
cvssV4_0
|
Wed, 12 Mar 2025 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | ruby-saml provides security assertion markup language (SAML) single sign-on (SSO) for Ruby. An authentication bypass vulnerability was found in ruby-saml prior to versions 1.12.4 and 1.18.0 due to a parser differential. ReXML and Nokogiri parse XML differently, the parsers can generate entirely different document structures from the same XML input. That allows an attacker to be able to execute a Signature Wrapping attack. This issue may lead to authentication bypass. Versions 1.12.4 and 1.18.0 contain a patch for the issue. | |
Title | Ruby SAML vulnerable to SAML authentication bypass due to namespace handling (parser differential) | |
Weaknesses | CWE-347 CWE-436 |
|
References |
|
|
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-03-12T20:53:24.353Z
Updated: 2025-03-20T13:22:15.681Z
Reserved: 2025-02-06T17:13:33.122Z
Link: CVE-2025-25292

Updated: 2025-03-15T20:47:21.997Z

Status : Awaiting Analysis
Published: 2025-03-12T21:15:42.177
Modified: 2025-03-20T14:15:24.213
Link: CVE-2025-25292

No data.