CVE-2017-11428: Ruby-SAML Improper Authentication vulnerability
7.7
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.62279%
CWE
Published
7/5/2019
Updated
1/24/2023
KEV Status
No
Technology
Ruby
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
ruby-saml | rubygems | < 1.7.0 | 1.7.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from how REXML's text extraction APIs (like Element#get_text) handle XML nodes with comments. The name_id method in Response class and element_text utility function would be primary points of text extraction from SAML assertions. These functions would appear in stack traces when processing malicious SAML payloads containing comments in authenticated elements. The Duo Security blog explicitly identifies REXML's text node handling as the root cause, and these are the core SAML processing functions that would interact with those APIs.