Metrics
Affected Vendors & Products
Fri, 14 Mar 2025 10:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Wed, 12 Mar 2025 21:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
cvssV4_0
|
cvssV4_0
|
Wed, 12 Mar 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 12 Mar 2025 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Wed, 12 Mar 2025 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | ruby-saml provides security assertion markup language (SAML) single sign-on (SSO) for Ruby. Prior to versions 1.12.4 and 1.18.0, ruby-saml is susceptible to remote Denial of Service (DoS) with compressed SAML responses. ruby-saml uses zlib to decompress SAML responses in case they're compressed. It is possible to bypass the message size check with a compressed assertion since the message size is checked before inflation and not after. This issue may lead to remote Denial of Service (DoS). Versions 1.12.4 and 1.18.0 fix the issue. | |
Title | ruby-saml vulnerable to Remote Denial of Service (DoS) with compressed SAML responses | |
Weaknesses | CWE-400 | |
References |
|
|
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-03-12T20:11:08.860Z
Updated: 2025-03-14T10:03:12.372Z
Reserved: 2025-02-06T17:13:33.122Z
Link: CVE-2025-25293

Updated: 2025-03-14T10:03:12.372Z

Status : Received
Published: 2025-03-12T21:15:42.363
Modified: 2025-03-14T10:15:16.783
Link: CVE-2025-25293

No data.