Bug 2351799 (CVE-2025-25291) - CVE-2025-25291 ruby-saml: Ruby SAML Authentication Bypass Vulnerability
Summary: CVE-2025-25291 ruby-saml: Ruby SAML Authentication Bypass Vulnerability
Keywords:
Status: NEW
Alias: CVE-2025-25291
Product: Security Response
Classification: Other
Component: vulnerability-draft
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-03-13 04:08 UTC by OSIDB Bzimport
Modified: 2025-03-20 10:34 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-03-13 04:08:51 UTC
ruby-saml provides security assertion markup language (SAML) single sign-on (SSO) for Ruby. An authentication bypass vulnerability was found in ruby-saml prior to versions 1.12.4 and 1.18.0 due to a parser differential. ReXML and Nokogiri parse XML differently; the parsers can generate entirely different document structures from the same XML input. That allows an attacker to be able to execute a Signature Wrapping attack. This issue may lead to authentication bypass. Versions 1.12.4 and 1.18.0 fix the issue.


Note You need to log in before you can comment on or make changes to this bug.