Ruby SAML allows remote Denial of Service (DoS) with compressed SAML responses
High severity
GitHub Reviewed
Published
Mar 12, 2025
in
SAML-Toolkits/ruby-saml
•
Updated Mar 12, 2025
Package
Affected versions
< 1.12.4
>= 1.13.0, < 1.18.0
Patched versions
1.12.4
1.18.0
Description
Published to the GitHub Advisory Database
Mar 12, 2025
Reviewed
Mar 12, 2025
Published by the National Vulnerability Database
Mar 12, 2025
Last updated
Mar 12, 2025
Summary
ruby-saml is susceptible to remote Denial of Service (DoS) with compressed SAML responses.
Ruby-saml uses zlib to decompress SAML responses in case they're compressed. It is possible to bypass the message size check with a compressed assertion since the message size is checked before inflation and not after.
Impact
This issue may lead to remote Denial of Service (DoS).
References