Lucene search

K
osvGoogleOSV:GHSA-JW9C-MFG7-9RX2
HistorySep 10, 2024 - 7:42 p.m.

SAML authentication bypass via Incorrect XPath selector

2024-09-1019:42:03
Google
osv.dev
6
saml
authentication
bypass
ruby-saml
xpath selector
signature verification
vulnerability
attacker
arbitrary contents
log in
securesaml

CVSS3

10

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N

AI Score

7.2

Confidence

High

EPSS

0

Percentile

16.4%

Ruby-SAML in <= 12.2 and 1.13.0 <= 1.16.0 does not properly verify the signature of the SAML Response. An unauthenticated attacker with access to any signed saml document (by the IdP) can thus forge a SAML Response/Assertion with arbitrary contents. This would allow the attacker to log in as arbitrary user within the vulnerable system.

This vulnerability was reported by ahacker1 of SecureSAML ([email protected])

CVSS3

10

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N

AI Score

7.2

Confidence

High

EPSS

0

Percentile

16.4%