SB2024092101 - Debian update for ruby-saml



SB2024092101 - Debian update for ruby-saml

Published: September 21, 2024 Updated: October 11, 2024

Security Bulletin ID SB2024092101
Severity
High
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Improper verification of cryptographic signature (CVE-ID: CVE-2024-45409)

The vulnerability allows a remote attacker to bypass SAML authentication.

The vulnerability exists due to the library does not properly verify the signature of the SAML Response. A remote non-authenticated attacker with access to any signed SAML document (by the IdP) can forge a SAML Response/Assertion with arbitrary contents, bypass authentication process and login under an arbitrary account within the application.

Successful exploitation of the vulnerability may allow an attacker to compromise the affected application.


Remediation

Install update from vendor's website.