CVE-2024-45409

high-risk
Published 2024-09-10

The Ruby SAML library is for implementing the client side of a SAML authorization. Ruby-SAML in <= 12.2 and 1.13.0 <= 1.16.0 does not properly verify the signature of the SAML Response. An unauthenticated attacker with access to any signed saml document (by the IdP) can thus forge a SAML Response/Assertion with arbitrary contents. This would allow the attacker to log in as arbitrary user within the vulnerable system. This vulnerability is fixed in 1.17.0 and 1.12.3.

Do I need to act?

!
42.4% chance of exploitation in next 30 days
EPSS score — higher than 58% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
+
Fix available
Upgrade to: 1ec5392bc506fe43a02dbb66b68741051c5ffeae, 1bc447f297b769d1a9abeb619ce074bd9c410a72, 1ec5392bc506fe43a02dbb66b68741051c5ffeae, 1bc447f297b769d1a9abeb619ce074bd9c410a72, f6896a3182abc8fa52bb9798c7be35adc0458657, 65eb2ddfb64f0b0098cdd693c58b243290a002d4, e95b84d953509f0235f606865d3738e2f7efce58, 18473c203a58f41d4af7a643dd7dada902cba80a, f2789346710c02e9dae2b74802f4b9397538129e
10
CVSS 10.0/10 Critical
NETWORK / LOW complexity

Affected Vendors

62
/ 100
high-risk
Severity 33/34 · Critical
Exploitability 17/34 · Moderate
Exposure 12/34 · Low