CVE-2025-25293

ruby-saml provides security assertion markup language (SAML) single sign-on (SSO) for Ruby. Prior to versions 1.12.4 and 1.18.0, ruby-saml is susceptible to remote Denial of Service (DoS) with compressed SAML responses. ruby-saml uses zlib to decompress SAML responses in case they're compressed. It is possible to bypass the message size check with a compressed assertion since the message size is checked before inflation and not after. This issue may lead to remote Denial of Service (DoS). Versions 1.12.4 and 1.18.0 fix the issue.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:omniauth:omniauth_saml:*:*:*:*:*:ruby:*:*
cpe:2.3:a:onelogin:ruby-saml:*:*:*:*:*:*:*:*
cpe:2.3:a:onelogin:ruby-saml:*:*:*:*:*:*:*:*
cpe:2.3:a:omniauth:omniauth_saml:*:*:*:*:*:ruby:*:*
cpe:2.3:a:omniauth:omniauth_saml:*:*:*:*:*:ruby:*:*

History

01 Aug 2025, 14:45

Type Values Removed Values Added
CPE cpe:2.3:a:onelogin:ruby-saml:*:*:*:*:*:*:*:*
cpe:2.3:a:omniauth:omniauth_saml:*:*:*:*:*:ruby:*:*
References () https://github.com/SAML-Toolkits/ruby-saml/releases/tag/v1.18.0 - () https://github.com/SAML-Toolkits/ruby-saml/releases/tag/v1.18.0 - Release Notes
References () https://github.blog/security/sign-in-as-anyone-bypassing-saml-sso-authentication-with-parser-differentials - () https://github.blog/security/sign-in-as-anyone-bypassing-saml-sso-authentication-with-parser-differentials - Exploit, Third Party Advisory
References () https://github.com/omniauth/omniauth-saml/security/advisories/GHSA-hw46-3hmr-x9xv - () https://github.com/omniauth/omniauth-saml/security/advisories/GHSA-hw46-3hmr-x9xv - Vendor Advisory
References () https://github.com/SAML-Toolkits/ruby-saml/releases/tag/v1.12.4 - () https://github.com/SAML-Toolkits/ruby-saml/releases/tag/v1.12.4 - Release Notes
References () https://about.gitlab.com/releases/2025/03/12/patch-release-gitlab-17-9-2-released - () https://about.gitlab.com/releases/2025/03/12/patch-release-gitlab-17-9-2-released - Patch
References () https://github.com/SAML-Toolkits/ruby-saml/commit/e2da4c6dae7dc01a4d9cd221395140a67e2b3eb1 - () https://github.com/SAML-Toolkits/ruby-saml/commit/e2da4c6dae7dc01a4d9cd221395140a67e2b3eb1 - Patch
References () https://security.netapp.com/advisory/ntap-20250314-0008/ - () https://security.netapp.com/advisory/ntap-20250314-0008/ - Third Party Advisory
References () https://github.com/SAML-Toolkits/ruby-saml/commit/acac9e9cc0b9a507882c614f25d41f8b47be349a - () https://github.com/SAML-Toolkits/ruby-saml/commit/acac9e9cc0b9a507882c614f25d41f8b47be349a - Patch
References () https://github.com/SAML-Toolkits/ruby-saml/security/advisories/GHSA-92rq-c8cf-prrq - () https://github.com/SAML-Toolkits/ruby-saml/security/advisories/GHSA-92rq-c8cf-prrq - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
First Time Omniauth
Omniauth omniauth Saml
Onelogin
Onelogin ruby-saml

14 Mar 2025, 10:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20250314-0008/ -

12 Mar 2025, 22:15

Type Values Removed Values Added
References
  • () https://github.blog/security/sign-in-as-anyone-bypassing-saml-sso-authentication-with-parser-differentials -
CWE CWE-400

12 Mar 2025, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-12 21:15

Updated : 2025-08-01 14:45


NVD link : CVE-2025-25293

Mitre link : CVE-2025-25293


JSON object : View

Products Affected

omniauth

  • omniauth_saml

onelogin

  • ruby-saml
CWE

No CWE.