First published: Wed Apr 17 2019(Updated: )
OmniAuth OmniAuth-SAML 1.9.0 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.
Credit: security@duo.com security@duo.com security@duo.com
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/omniauth-saml | <1.10.0 | 1.10.0 |
OmniAuth-SAML | <=1.9.0 | |
OmniAuth SAML | <=1.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-11430 is classified as a high-severity vulnerability due to its potential to allow attackers to manipulate SAML data without invalidating the signature.
To fix CVE-2017-11430, upgrade the omniauth-saml package to version 1.10.0 or later.
CVE-2017-11430 affects versions of omniauth-saml up to and including 1.9.0.
CVE-2017-11430 is a SAML-related vulnerability that involves issues with XML DOM traversal and canonicalization.
Yes, CVE-2017-11430 can potentially be exploited remotely by attackers to bypass authentication mechanisms.