Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-54572

Опубликовано: 30 июл. 2025
Источник: debian
EPSS Низкий

Описание

The Ruby SAML library is for implementing the client side of a SAML authorization. In versions 1.18.0 and below, a denial-of-service vulnerability exists in ruby-saml even with the message_max_bytesize setting configured. The vulnerability occurs because the SAML response is validated for Base64 format prior to checking the message size, leading to potential resource exhaustion. This is fixed in version 1.18.1.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ruby-samlremovedpackage

Примечания

  • https://github.com/SAML-Toolkits/ruby-saml/security/advisories/GHSA-rrqh-93c8-j966

  • https://github.com/SAML-Toolkits/ruby-saml/pull/770

  • Fixed by: https://github.com/SAML-Toolkits/ruby-saml/commit/fd2f532862b6453069d69d07a541e668609c2bbc

  • This is a continuation/fix of CVE-2025-25293 that added the max_bytesize check too late:

  • https://github.com/SAML-Toolkits/ruby-saml/commit/533c84ebfc40f8cbac645b6c76ce4949f95d27d6 (v1.12.0)

EPSS

Процентиль: 25%
0.00085
Низкий

Связанные уязвимости

ubuntu
6 месяцев назад

The Ruby SAML library is for implementing the client side of a SAML authorization. In versions 1.18.0 and below, a denial-of-service vulnerability exists in ruby-saml even with the message_max_bytesize setting configured. The vulnerability occurs because the SAML response is validated for Base64 format prior to checking the message size, leading to potential resource exhaustion. This is fixed in version 1.18.1.

nvd
6 месяцев назад

The Ruby SAML library is for implementing the client side of a SAML authorization. In versions 1.18.0 and below, a denial-of-service vulnerability exists in ruby-saml even with the message_max_bytesize setting configured. The vulnerability occurs because the SAML response is validated for Base64 format prior to checking the message size, leading to potential resource exhaustion. This is fixed in version 1.18.1.

github
6 месяцев назад

Ruby SAML DOS vulnerability with large SAML response

EPSS

Процентиль: 25%
0.00085
Низкий