Search for an article

Select a plan

Choose a plan from below, subscribe, and get access to our exclusive articles!

Monthly plan

$
13
$
0
billed monthly

Yearly plan

$
100
$
0
billed yearly

All plans include

  • Donec sagittis elementum
  • Cras tempor massa
  • Mauris eget nulla ut
  • Maecenas nec mollis
  • Donec feugiat rhoncus
  • Sed tristique laoreet
  • Fusce luctus quis urna
  • In eu nulla vehicula
  • Duis eu luctus metus
  • Maecenas consectetur
  • Vivamus mauris purus
  • Aenean neque ipsum
Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

HomeCyber BalkansGitHub discovers vulnerabilities in ruby-saml that expose users

GitHub discovers vulnerabilities in ruby-saml that expose users

Published on

spot_img

Two high-severity vulnerabilities have recently been unearthed in the ruby-saml library, known for managing SAML authentication processes. Identified as CVE-2025-25291 and CVE-2025-25292, these weaknesses have the potential to permit malicious actors to circumvent authentication safeguards. By doing so, unauthorized parties may gain entry, ultimately paving the way for possible account takeover endeavors. The root of both vulnerabilities lies in how the REXML and Nokogiri XML parsers interpret data differently, thereby creating a parsing inconsistency.

Marked with a CVSS score of 8.8 out of 10.0, the security flaws specifically impact certain versions of ruby-saml. They are present in versions anterior to 1.12.4, as well as versions ranging from 1.13.0 to 1.18.0. Exploiting these vulnerabilities would grant perpetrators the ability to carry out a Signature Wrapping attack. Through this method, authentication could be bypassed, affording wrongdoers the opportunity to mimic any user by fabricating their own SAML assertions.

The revelation of these vulnerabilities was brought forth by GitHub, with the issue first reported in November of 2024. Exploiting the flaws capitalizes on a discrepancy between signature and hash verification, setting the stage for potential exploitation. Remedying these vulnerabilities entailed the deployment of updates in ruby-saml versions 1.12.4 and 1.18.0.

These updated versions also tackle a denial-of-service (DoS) flaw linked to compressed SAML responses, denoted as CVE-2025-25293. In response to the risks posed by these vulnerabilities, GitLab has taken proactive measures by releasing updates for both its Community Edition (CE) and Enterprise Edition (EE). By introducing versions 17.9.2, 17.8.5, and 17.7.7, the vulnerabilities have been effectively addressed, thwarting potential exploitation within GitLab instances utilizing SAML authentication. Nevertheless, successful exploitation necessitates that the attacker has previously compromised a valid user account.

To elaborate, the attacker must possess a signed SAML document from the Identity Provider (IdP) to authenticate as another user within the SAML environment. Consequently, while the vulnerabilities are indeed severe, the prerequisite of prior access to a valid user account curtails immediate impact. Nonetheless, the looming threat remains significant for the organizations affected by these security gaps.

In conclusion, the discovery of these vulnerabilities underscores the importance of prompt updates and vigilant security measures in the realm of SAML authentication. By swiftly addressing these issues and implementing necessary safeguards, organizations can mitigate potential risks and uphold the integrity of their systems.

Source link

Latest articles

Social Media and Email hacking on the rise in 2024

In 2024, a significant surge in hacking activities targeting social media and email accounts...

Preparing For The AI-Generated Cyber Threats Of 2025 – Source: www.cyberdefensemagazine.com

In recent years, the digital threat landscape has undergone a significant transformation, with Advanced...

KP Cyber Cell Recovers Rs 25.6 Lakhs Lost in WhatsApp Fraud in Kolkata

In a recent development, the Kolkata Police Cyber Cell has successfully recovered a substantial...

ClickFix Attack Puts Over 100 Car Dealership Websites at Risk

Recently, the ClickFix attack tactic has been making headlines as it appears to be...

More like this

Social Media and Email hacking on the rise in 2024

In 2024, a significant surge in hacking activities targeting social media and email accounts...

Preparing For The AI-Generated Cyber Threats Of 2025 – Source: www.cyberdefensemagazine.com

In recent years, the digital threat landscape has undergone a significant transformation, with Advanced...

KP Cyber Cell Recovers Rs 25.6 Lakhs Lost in WhatsApp Fraud in Kolkata

In a recent development, the Kolkata Police Cyber Cell has successfully recovered a substantial...