/
DirectorySecurity Advisories
Sign In
Security Advisories

CGA-phrw-96x2-wmvv

Published

Last updated

https://images.chainguard.dev/security/CGA-phrw-96x2-wmvv
Package

gitlab-rails-ee-fips-17.0

Repository

Chainguard

Latest Update
Fix not planned
Aliases
  • GHSA-jw9c-mfg7-9rx2

Severity

Unknown

Summary

SAML authentication bypass via Incorrect XPath selector

Description

Ruby-SAML in <= 12.2 and 1.13.0 <= 1.16.0 does not properly verify the signature of the SAML Response. An unauthenticated attacker with access to any signed saml document (by the IdP) can thus forge a SAML Response/Assertion with arbitrary contents. This would allow the attacker to log in as arbitrary user within the vulnerable system.

This vulnerability was reported by ahacker1 of SecureSAML (ahacker1@securesaml.com)

References

Updates


Safe Source for Open Sourceâ„¢
Media KitContact Us
© 2025 Chainguard. All Rights Reserved.
Private PolicyTerms of Use

Products

Chainguard ContainersChainguard LibrariesChainguard VMs