cve-2025-25293
Vulnerability from cvelistv5
Published
2025-03-12 20:11
Modified
2025-03-14 10:03
Severity ?
EPSS score ?
0.21%
(0.43119)
Summary
ruby-saml provides security assertion markup language (SAML) single sign-on (SSO) for Ruby. Prior to versions 1.12.4 and 1.18.0, ruby-saml is susceptible to remote Denial of Service (DoS) with compressed SAML responses. ruby-saml uses zlib to decompress SAML responses in case they're compressed. It is possible to bypass the message size check with a compressed assertion since the message size is checked before inflation and not after. This issue may lead to remote Denial of Service (DoS). Versions 1.12.4 and 1.18.0 fix the issue.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
SAML-Toolkits | ruby-saml |
Version: < 1.12.4 Version: >= 1.13.0, < 1.18.0 |
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2025-25293", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2025-03-12T20:36:09.253658Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2025-03-12T20:36:17.830Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2025-03-14T10:03:12.372Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { url: "https://security.netapp.com/advisory/ntap-20250314-0008/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "ruby-saml", vendor: "SAML-Toolkits", versions: [ { status: "affected", version: "< 1.12.4", }, { status: "affected", version: ">= 1.13.0, < 1.18.0", }, ], }, ], descriptions: [ { lang: "en", value: "ruby-saml provides security assertion markup language (SAML) single sign-on (SSO) for Ruby. Prior to versions 1.12.4 and 1.18.0, ruby-saml is susceptible to remote Denial of Service (DoS) with compressed SAML responses. ruby-saml uses zlib to decompress SAML responses in case they're compressed. It is possible to bypass the message size check with a compressed assertion since the message size is checked before inflation and not after. This issue may lead to remote Denial of Service (DoS). Versions 1.12.4 and 1.18.0 fix the issue.", }, ], metrics: [ { cvssV4_0: { attackComplexity: "LOW", attackRequirements: "NONE", attackVector: "NETWORK", baseScore: 7.7, baseSeverity: "HIGH", privilegesRequired: "NONE", subAvailabilityImpact: "NONE", subConfidentialityImpact: "NONE", subIntegrityImpact: "NONE", userInteraction: "NONE", vectorString: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P", version: "4.0", vulnAvailabilityImpact: "HIGH", vulnConfidentialityImpact: "NONE", vulnIntegrityImpact: "NONE", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-400", description: "CWE-400: Uncontrolled Resource Consumption", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-12T21:40:24.009Z", orgId: "a0819718-46f1-4df5-94e2-005712e83aaa", shortName: "GitHub_M", }, references: [ { name: "https://github.com/SAML-Toolkits/ruby-saml/security/advisories/GHSA-92rq-c8cf-prrq", tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/SAML-Toolkits/ruby-saml/security/advisories/GHSA-92rq-c8cf-prrq", }, { name: "https://github.com/omniauth/omniauth-saml/security/advisories/GHSA-hw46-3hmr-x9xv", tags: [ "x_refsource_MISC", ], url: "https://github.com/omniauth/omniauth-saml/security/advisories/GHSA-hw46-3hmr-x9xv", }, { name: "https://github.com/SAML-Toolkits/ruby-saml/commit/acac9e9cc0b9a507882c614f25d41f8b47be349a", tags: [ "x_refsource_MISC", ], url: "https://github.com/SAML-Toolkits/ruby-saml/commit/acac9e9cc0b9a507882c614f25d41f8b47be349a", }, { name: "https://github.com/SAML-Toolkits/ruby-saml/commit/e2da4c6dae7dc01a4d9cd221395140a67e2b3eb1", tags: [ "x_refsource_MISC", ], url: "https://github.com/SAML-Toolkits/ruby-saml/commit/e2da4c6dae7dc01a4d9cd221395140a67e2b3eb1", }, { name: "https://about.gitlab.com/releases/2025/03/12/patch-release-gitlab-17-9-2-released", tags: [ "x_refsource_MISC", ], url: "https://about.gitlab.com/releases/2025/03/12/patch-release-gitlab-17-9-2-released", }, { name: "https://github.blog/security/sign-in-as-anyone-bypassing-saml-sso-authentication-with-parser-differentials", tags: [ "x_refsource_MISC", ], url: "https://github.blog/security/sign-in-as-anyone-bypassing-saml-sso-authentication-with-parser-differentials", }, { name: "https://github.com/SAML-Toolkits/ruby-saml/releases/tag/v1.12.4", tags: [ "x_refsource_MISC", ], url: "https://github.com/SAML-Toolkits/ruby-saml/releases/tag/v1.12.4", }, { name: "https://github.com/SAML-Toolkits/ruby-saml/releases/tag/v1.18.0", tags: [ "x_refsource_MISC", ], url: "https://github.com/SAML-Toolkits/ruby-saml/releases/tag/v1.18.0", }, ], source: { advisory: "GHSA-92rq-c8cf-prrq", discovery: "UNKNOWN", }, title: "ruby-saml vulnerable to Remote Denial of Service (DoS) with compressed SAML responses", }, }, cveMetadata: { assignerOrgId: "a0819718-46f1-4df5-94e2-005712e83aaa", assignerShortName: "GitHub_M", cveId: "CVE-2025-25293", datePublished: "2025-03-12T20:11:08.860Z", dateReserved: "2025-02-06T17:13:33.122Z", dateUpdated: "2025-03-14T10:03:12.372Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2025-25293\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2025-03-12T21:15:42.363\",\"lastModified\":\"2025-03-14T10:15:16.783\",\"vulnStatus\":\"Received\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"ruby-saml provides security assertion markup language (SAML) single sign-on (SSO) for Ruby. Prior to versions 1.12.4 and 1.18.0, ruby-saml is susceptible to remote Denial of Service (DoS) with compressed SAML responses. ruby-saml uses zlib to decompress SAML responses in case they're compressed. It is possible to bypass the message size check with a compressed assertion since the message size is checked before inflation and not after. This issue may lead to remote Denial of Service (DoS). Versions 1.12.4 and 1.18.0 fix the issue.\"},{\"lang\":\"es\",\"value\":\"ruby-saml proporciona inicio de sesión único (SSO) con lenguaje de marcado para aserciones de seguridad (SAML) para Ruby. En versiones anteriores a la 1.12.4 y la 1.18.0, ruby-saml era susceptible a ataques de denegación de servicio (DoS) remotos con respuestas SAML comprimidas. ruby-saml utiliza zlib para descomprimir las respuestas SAML en caso de que estén comprimidas. Es posible omitir la comprobación del tamaño del mensaje con una aserción comprimida, ya que el tamaño del mensaje se comprueba antes del inflado, no después. Este problema puede provocar ataques de denegación de servicio (DoS) remotos. Las versiones 1.12.4 y 1.18.0 solucionan el problema.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":7.7,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"NONE\",\"vulnIntegrityImpact\":\"NONE\",\"vulnAvailabilityImpact\":\"HIGH\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"PROOF_OF_CONCEPT\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"}]}],\"references\":[{\"url\":\"https://about.gitlab.com/releases/2025/03/12/patch-release-gitlab-17-9-2-released\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.blog/security/sign-in-as-anyone-bypassing-saml-sso-authentication-with-parser-differentials\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/SAML-Toolkits/ruby-saml/commit/acac9e9cc0b9a507882c614f25d41f8b47be349a\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/SAML-Toolkits/ruby-saml/commit/e2da4c6dae7dc01a4d9cd221395140a67e2b3eb1\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/SAML-Toolkits/ruby-saml/releases/tag/v1.12.4\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/SAML-Toolkits/ruby-saml/releases/tag/v1.18.0\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/SAML-Toolkits/ruby-saml/security/advisories/GHSA-92rq-c8cf-prrq\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/omniauth/omniauth-saml/security/advisories/GHSA-hw46-3hmr-x9xv\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20250314-0008/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}", vulnrichment: { containers: "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://security.netapp.com/advisory/ntap-20250314-0008/\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-03-14T10:03:12.372Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-25293\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-03-12T20:36:09.253658Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-03-12T20:36:13.254Z\"}}], \"cna\": {\"title\": \"ruby-saml vulnerable to Remote Denial of Service (DoS) with compressed SAML responses\", \"source\": {\"advisory\": \"GHSA-92rq-c8cf-prrq\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV4_0\": {\"version\": \"4.0\", \"baseScore\": 7.7, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"NONE\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"NONE\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"HIGH\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"SAML-Toolkits\", \"product\": \"ruby-saml\", \"versions\": [{\"status\": \"affected\", \"version\": \"< 1.12.4\"}, {\"status\": \"affected\", \"version\": \">= 1.13.0, < 1.18.0\"}]}], \"references\": [{\"url\": \"https://github.com/SAML-Toolkits/ruby-saml/security/advisories/GHSA-92rq-c8cf-prrq\", \"name\": \"https://github.com/SAML-Toolkits/ruby-saml/security/advisories/GHSA-92rq-c8cf-prrq\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/omniauth/omniauth-saml/security/advisories/GHSA-hw46-3hmr-x9xv\", \"name\": \"https://github.com/omniauth/omniauth-saml/security/advisories/GHSA-hw46-3hmr-x9xv\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/SAML-Toolkits/ruby-saml/commit/acac9e9cc0b9a507882c614f25d41f8b47be349a\", \"name\": \"https://github.com/SAML-Toolkits/ruby-saml/commit/acac9e9cc0b9a507882c614f25d41f8b47be349a\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/SAML-Toolkits/ruby-saml/commit/e2da4c6dae7dc01a4d9cd221395140a67e2b3eb1\", \"name\": \"https://github.com/SAML-Toolkits/ruby-saml/commit/e2da4c6dae7dc01a4d9cd221395140a67e2b3eb1\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://about.gitlab.com/releases/2025/03/12/patch-release-gitlab-17-9-2-released\", \"name\": \"https://about.gitlab.com/releases/2025/03/12/patch-release-gitlab-17-9-2-released\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.blog/security/sign-in-as-anyone-bypassing-saml-sso-authentication-with-parser-differentials\", \"name\": \"https://github.blog/security/sign-in-as-anyone-bypassing-saml-sso-authentication-with-parser-differentials\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/SAML-Toolkits/ruby-saml/releases/tag/v1.12.4\", \"name\": \"https://github.com/SAML-Toolkits/ruby-saml/releases/tag/v1.12.4\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/SAML-Toolkits/ruby-saml/releases/tag/v1.18.0\", \"name\": \"https://github.com/SAML-Toolkits/ruby-saml/releases/tag/v1.18.0\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"ruby-saml provides security assertion markup language (SAML) single sign-on (SSO) for Ruby. Prior to versions 1.12.4 and 1.18.0, ruby-saml is susceptible to remote Denial of Service (DoS) with compressed SAML responses. ruby-saml uses zlib to decompress SAML responses in case they're compressed. It is possible to bypass the message size check with a compressed assertion since the message size is checked before inflation and not after. This issue may lead to remote Denial of Service (DoS). Versions 1.12.4 and 1.18.0 fix the issue.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-400\", \"description\": \"CWE-400: Uncontrolled Resource Consumption\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2025-03-12T21:40:24.009Z\"}}}", cveMetadata: "{\"cveId\": \"CVE-2025-25293\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-03-14T10:03:12.372Z\", \"dateReserved\": \"2025-02-06T17:13:33.122Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2025-03-12T20:11:08.860Z\", \"assignerShortName\": \"GitHub_M\"}", dataType: "CVE_RECORD", dataVersion: "5.1", }, }, }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.