Ruby SAML allows a SAML authentication bypass due to DOCTYPE handling (parser differential)
High severity
GitHub Reviewed
Published
Mar 12, 2025
in
SAML-Toolkits/ruby-saml
•
Updated Mar 12, 2025
Package
Affected versions
< 1.12.4
>= 1.13.0, < 1.18.0
Patched versions
1.12.4
1.18.0
Description
Published to the GitHub Advisory Database
Mar 12, 2025
Reviewed
Mar 12, 2025
Published by the National Vulnerability Database
Mar 12, 2025
Last updated
Mar 12, 2025
Summary
An authentication bypass vulnerability was found in ruby-saml due to a parser differential.
ReXML and Nokogiri parse XML differently, the parsers can generate entirely different document structures from the same XML input. That allows an attacker to be able to execute a Signature Wrapping attack.
Impact
This issue may lead to authentication bypass.
References