Sha256: d809b616f0da908b34efaf3440db7dbaeb092bf3c171d4f45f5814ce4eac5c05
Contents?: true
Size: 640 Bytes
Versions: 2
Compression:
Stored size: 640 Bytes
Contents
--- gem: ruby-saml cve: 2016-5697 url: https://github.com/onelogin/ruby-saml/commit/a571f52171e6bfd87db59822d1d9e8c38fb3b995 title: XML signature wrapping attack date: 2016-06-24 description: | ruby-saml prior to version 1.3.0 is vulnerable to an XML signature wrapping attack in the specific scenario where there was a signature that referenced at the same time 2 elements (but past the scheme validator process since 1 of the element was inside the encrypted assertion). ruby-saml users must update to 1.3.0, which implements 3 extra validations to mitigate this kind of attack. cvss_v3: 6.1 patched_versions: - ">= 1.3.0"
Version data entries
2 entries across 2 versions & 1 rubygems
Version | Path |
---|---|
bundler-audit-0.6.1 | data/ruby-advisory-db/gems/ruby-saml/CVE-2016-5697.yml |
bundler-audit-0.6.0 | data/ruby-advisory-db/gems/ruby-saml/CVE-2016-5697.yml |