Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4115-1 | ruby-saml security update |
Github GHSA |
GHSA-4vc4-m8qh-g8jm | Ruby SAML allows a SAML authentication bypass due to DOCTYPE handling (parser differential) |
Ubuntu USN |
USN-7409-1 | RubySAML vulnerabilities |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 04 Nov 2025 05:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Sat, 13 Sep 2025 04:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Sat, 02 Aug 2025 04:00:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Netapp
Netapp storagegrid Omniauth Omniauth omniauth Saml Onelogin Onelogin ruby-saml |
|
| CPEs | cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:* cpe:2.3:a:omniauth:omniauth_saml:*:*:*:*:*:ruby:*:* cpe:2.3:a:onelogin:ruby-saml:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Netapp
Netapp storagegrid Omniauth Omniauth omniauth Saml Onelogin Onelogin ruby-saml |
|
| Metrics |
cvssV3_1
|
Sat, 12 Jul 2025 22:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 04 Apr 2025 05:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
ssvc
|
Thu, 20 Mar 2025 22:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
cvssV4_0
|
cvssV4_0
|
Tue, 18 Mar 2025 03:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
ssvc
|
Sun, 16 Mar 2025 06:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 14 Mar 2025 19:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 13 Mar 2025 06:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
cvssV4_0
|
cvssV4_0
|
Thu, 13 Mar 2025 06:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 13 Mar 2025 06:00:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 13 Mar 2025 05:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-436 |
Thu, 13 Mar 2025 05:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ruby-saml provides security assertion markup language (SAML) single sign-on (SSO) for Ruby. An authentication bypass vulnerability was found in ruby-saml prior to versions 1.12.4 and 1.18.0 due to a parser differential. ReXML and Nokogiri parse XML differently; the parsers can generate entirely different document structures from the same XML input. That allows an attacker to be able to execute a Signature Wrapping attack. This issue may lead to authentication bypass. Versions 1.12.4 and 1.18.0 fix the issue. | |
| Title | ruby-saml vulnerable to SAML authentication bypass due to DOCTYPE handling (parser differential) | |
| Weaknesses | CWE-347 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-11-03T19:44:59.719Z
Reserved: 2025-02-06T17:13:33.122Z
Link: CVE-2025-25291
Updated: 2025-03-15T20:47:03.479Z
Status : Modified
Published: 2025-03-12T21:15:42.000
Modified: 2025-11-03T20:17:58.333
Link: CVE-2025-25291
No data.
OpenCVE Enrichment
No data.
Debian DLA
Github GHSA
Ubuntu USN