Количество 5
Количество 5
CVE-2025-25291
ruby-saml provides security assertion markup language (SAML) single sign-on (SSO) for Ruby. An authentication bypass vulnerability was found in ruby-saml prior to versions 1.12.4 and 1.18.0 due to a parser differential. ReXML and Nokogiri parse XML differently; the parsers can generate entirely different document structures from the same XML input. That allows an attacker to be able to execute a Signature Wrapping attack. This issue may lead to authentication bypass. Versions 1.12.4 and 1.18.0 fix the issue.
CVE-2025-25291
ruby-saml provides security assertion markup language (SAML) single sign-on (SSO) for Ruby. An authentication bypass vulnerability was found in ruby-saml prior to versions 1.12.4 and 1.18.0 due to a parser differential. ReXML and Nokogiri parse XML differently; the parsers can generate entirely different document structures from the same XML input. That allows an attacker to be able to execute a Signature Wrapping attack. This issue may lead to authentication bypass. Versions 1.12.4 and 1.18.0 fix the issue.
CVE-2025-25291
ruby-saml provides security assertion markup language (SAML) single si ...
GHSA-4vc4-m8qh-g8jm
Ruby SAML allows a SAML authentication bypass due to DOCTYPE handling (parser differential)
BDU:2025-02818
Уязвимость протокола единого входа SAML SSO библиотеки Ruby SAML и программной платформы на базе git для совместной работы над кодом GitLab CE/EE, позволяющая нарушителю обойти аутентификацию
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-25291 ruby-saml provides security assertion markup language (SAML) single sign-on (SSO) for Ruby. An authentication bypass vulnerability was found in ruby-saml prior to versions 1.12.4 and 1.18.0 due to a parser differential. ReXML and Nokogiri parse XML differently; the parsers can generate entirely different document structures from the same XML input. That allows an attacker to be able to execute a Signature Wrapping attack. This issue may lead to authentication bypass. Versions 1.12.4 and 1.18.0 fix the issue. | CVSS3: 9.8 | 14% Средний | 11 месяцев назад | |
CVE-2025-25291 ruby-saml provides security assertion markup language (SAML) single sign-on (SSO) for Ruby. An authentication bypass vulnerability was found in ruby-saml prior to versions 1.12.4 and 1.18.0 due to a parser differential. ReXML and Nokogiri parse XML differently; the parsers can generate entirely different document structures from the same XML input. That allows an attacker to be able to execute a Signature Wrapping attack. This issue may lead to authentication bypass. Versions 1.12.4 and 1.18.0 fix the issue. | CVSS3: 9.8 | 14% Средний | 11 месяцев назад | |
CVE-2025-25291 ruby-saml provides security assertion markup language (SAML) single si ... | CVSS3: 9.8 | 14% Средний | 11 месяцев назад | |
GHSA-4vc4-m8qh-g8jm Ruby SAML allows a SAML authentication bypass due to DOCTYPE handling (parser differential) | CVSS3: 9.8 | 14% Средний | 11 месяцев назад | |
BDU:2025-02818 Уязвимость протокола единого входа SAML SSO библиотеки Ruby SAML и программной платформы на базе git для совместной работы над кодом GitLab CE/EE, позволяющая нарушителю обойти аутентификацию | CVSS3: 9.1 | 14% Средний | 11 месяцев назад |
Уязвимостей на страницу