omniauth-saml 1.2.0

2 security vulnerabilities found in version 1.2.0

omniauth-saml vulnerable to Improper Verification of Cryptographic Signature

critical severity CVE-2024-45409
critical severity CVE-2024-45409
Patched versions: >= 1.10.5, < 2.0.0, ~> 2.1.2, >= 2.2.1

ruby-saml, the dependent SAML gem of omniauth-saml has a signature wrapping vulnerability in <= v1.12.0 and v1.13.0 to v1.16.0 , see https://github.com/SAML-Toolkits/ruby-saml/security/advisories/GHSA-jw9c-mfg7-9rx2

As a result, omniauth-saml created a new release by upgrading ruby-saml to the patched versions v1.17.

omniauth-saml authentication bypass via incorrect XML canonicalization and DOM traversal

critical severity CVE-2017-11430
critical severity CVE-2017-11430
Patched versions: >= 1.10.0

OmniAuth OmnitAuth-SAML 1.9.0 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.

No officially reported memory leakage issues detected.


This gem version does not have any officially reported memory leaked issues.

No license issues detected.


This gem version has a license in the gemspec.

This gem version is available.


This gem version has not been yanked and is still available for usage.