[DRE-maint] Bug#1100441: ruby-saml: CVE-2025-25291 CVE-2025-25292 CVE-2025-25293
Salvatore Bonaccorso
carnil at debian.org
Thu Mar 13 21:54:40 GMT 2025
Source: ruby-saml
Version: 1.17.0-1
Severity: grave
Tags: upstream
Justification: user security hole
X-Debbugs-Cc: carnil at debian.org
Hi,
The following vulnerabilities were published for ruby-saml.
CVE-2025-25291[0]:
| ruby-saml provides security assertion markup language (SAML) single
| sign-on (SSO) for Ruby. An authentication bypass vulnerability was
| found in ruby-saml prior to versions 1.12.4 and 1.18.0 due to a
| parser differential. ReXML and Nokogiri parse XML differently; the
| parsers can generate entirely different document structures from the
| same XML input. That allows an attacker to be able to execute a
| Signature Wrapping attack. This issue may lead to authentication
| bypass. Versions 1.12.4 and 1.18.0 fix the issue.
CVE-2025-25292[1]:
| ruby-saml provides security assertion markup language (SAML) single
| sign-on (SSO) for Ruby. An authentication bypass vulnerability was
| found in ruby-saml prior to versions 1.12.4 and 1.18.0 due to a
| parser differential. ReXML and Nokogiri parse XML differently, the
| parsers can generate entirely different document structures from the
| same XML input. That allows an attacker to be able to execute a
| Signature Wrapping attack. This issue may lead to authentication
| bypass. Versions 1.12.4 and 1.18.0 contain a patch for the issue.
CVE-2025-25293[2]:
| ruby-saml provides security assertion markup language (SAML) single
| sign-on (SSO) for Ruby. Prior to versions 1.12.4 and 1.18.0, ruby-
| saml is susceptible to remote Denial of Service (DoS) with
| compressed SAML responses. ruby-saml uses zlib to decompress SAML
| responses in case they're compressed. It is possible to bypass the
| message size check with a compressed assertion since the message
| size is checked before inflation and not after. This issue may lead
| to remote Denial of Service (DoS). Versions 1.12.4 and 1.18.0 fix
| the issue.
If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2025-25291
https://www.cve.org/CVERecord?id=CVE-2025-25291
[1] https://security-tracker.debian.org/tracker/CVE-2025-25292
https://www.cve.org/CVERecord?id=CVE-2025-25292
[2] https://security-tracker.debian.org/tracker/CVE-2025-25293
https://www.cve.org/CVERecord?id=CVE-2025-25293
Please adjust the affected versions in the BTS as needed.
Regards,
Salvatore
More information about the Pkg-ruby-extras-maintainers
mailing list