Miggo Logo

GHSA-cvp8-5r8g-fhvq: omniauth-saml vulnerable to Improper Verification of Cryptographic Signature

10

CVSS Score
3.1

Basic Information

CVE ID
-
EPSS Score
-
Published
9/11/2024
Updated
9/19/2024
KEV Status
No
Technology
TechnologyRuby

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
omniauth-samlrubygems>= 2.0.0, < 2.1.22.1.2
omniauth-samlrubygems< 1.10.51.10.5
omniauth-samlrubygems>= 2.2.0, < 2.2.12.2.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability originates from the ruby-saml dependency (<=1.12.0 and 1.13.0-1.16.0), which improperly handles XML signature verification due to an incorrect XPath selector. omniauth-saml itself does not contain the vulnerable code but becomes vulnerable by depending on unpatched ruby-saml versions. The patches for omniauth-saml (1.10.5, 2.1.2, 2.2.1) only update the ruby-saml dependency to a fixed version (>=1.17.0). No functions in omniauth-saml's codebase directly implement the flawed cryptographic verification logic; the vulnerability is inherited via the dependency chain.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

ru*y-s*ml, t** **p*n**nt S*ML **m o* omni*ut*-s*ml **s * si*n*tur* wr*ppin* vuln*r**ility in <= v*.**.* *n* v*.**.* to v*.**.* , s** *ttps://*it*u*.*om/S*ML-Toolkits/ru*y-s*ml/s**urity/**visori*s/**S*-jw**-m***-*rx* *s * r*sult, omni*ut*-s*ml *r**t*

Reasoning

T** vuln*r**ility ori*in*t*s *rom t** ru*y-s*ml **p*n**n*y (<=*.**.* *n* *.**.*-*.**.*), w*i** improp*rly **n*l*s XML si*n*tur* v*ri*i**tion *u* to *n in*orr**t XP*t* s*l**tor. omni*ut*-s*ml its*l* *o*s not *ont*in t** vuln*r**l* *o** *ut ***om*s vul
GHSA-cvp8-5r8g-fhvq: Omniauth-SAML Sig Wrap Bypass | Miggo