-
-
Notifications
You must be signed in to change notification settings - Fork 231
Expand file tree
/
Copy pathCVE-2025-25293.yml
More file actions
34 lines (32 loc) · 1.54 KB
/
CVE-2025-25293.yml
File metadata and controls
34 lines (32 loc) · 1.54 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
---
gem: ruby-saml
cve: 2025-25293
ghsa: 92rq-c8cf-prrq
url: https://github.com/SAML-Toolkits/ruby-saml/security/advisories/GHSA-92rq-c8cf-prrq
title: Ruby SAML allows remote Denial of Service (DoS) with compressed SAML responses
date: 2025-03-12
description: |-
### Summary
ruby-saml is susceptible to remote Denial of Service (DoS) with compressed SAML responses.
Ruby-saml uses zlib to decompress SAML responses in case they're compressed.
It is possible to bypass the message size check with a compressed assertion
since the message size is checked before inflation and not after.
### Impact
This issue may lead to remote Denial of Service (DoS).
cvss_v3: 7.5
cvss_v4: 8.8
patched_versions:
- "~> 1.12.4"
- ">= 1.18.0"
related:
url:
- https://github.com/SAML-Toolkits/ruby-saml/security/advisories/GHSA-92rq-c8cf-prrq
- https://github.com/SAML-Toolkits/ruby-saml/commit/acac9e9cc0b9a507882c614f25d41f8b47be349a
- https://github.com/omniauth/omniauth-saml/security/advisories/GHSA-hw46-3hmr-x9xv
- https://nvd.nist.gov/vuln/detail/CVE-2025-25293
- https://github.com/SAML-Toolkits/ruby-saml/commit/e2da4c6dae7dc01a4d9cd221395140a67e2b3eb1
- https://about.gitlab.com/releases/2025/03/12/patch-release-gitlab-17-9-2-released
- https://github.blog/security/sign-in-as-anyone-bypassing-saml-sso-authentication-with-parser-differentials
- https://github.com/SAML-Toolkits/ruby-saml/releases/tag/v1.12.4
- https://github.com/SAML-Toolkits/ruby-saml/releases/tag/v1.18.0
- https://github.com/advisories/GHSA-92rq-c8cf-prrq