ruby-saml provides security assertion markup language (SAML) single sign-on (SSO) for Ruby. An authentication bypass vulnerability was found in ruby-saml prior to versions 1.12.4 and 1.18.0 due to a parser differential. ReXML and Nokogiri parse XML differently, the parsers can generate entirely different document structures from the same XML input. That allows an attacker to be able to execute a Signature Wrapping attack. This issue may lead to authentication bypass. Versions 1.12.4 and 1.18.0 contain a patch for the issue.
2025-03-12T21:15:42.177
2025-11-03T20:17:58.943
Modified
CVSSv3.1: 9.8 (CRITICAL)
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Application | omniauth | omniauth_saml | < 1.10.6 | Yes |
| Application | omniauth | omniauth_saml | < 2.1.3 | Yes |
| Application | omniauth | omniauth_saml | < 2.2.3 | Yes |
| Application | onelogin | ruby-saml | < 1.12.4 | Yes |
| Application | onelogin | ruby-saml | < 1.18.0 | Yes |
| Application | netapp | storagegrid | - | Yes |