FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

ruby-saml -- XML signature wrapping attack

Affected packages
rubygem-ruby-saml < 1.3.0

Details

VuXML ID 3fcd52b2-4510-11e6-a15f-00248c0c745d
Discovery 2016-06-24
Entry 2016-07-08

RubySec reports:

ruby-saml prior to version 1.3.0 is vulnerable to an XML signature wrapping attack in the specific scenario where there was a signature that referenced at the same time 2 elements (but past the scheme validator process since 1 of the element was inside the encrypted assertion).

ruby-saml users must update to 1.3.0, which implements 3 extra validations to mitigate this kind of attack.

References

CVE Name CVE-2016-5697
URL http://rubysec.com/advisories/CVE-2016-5697/
URL https://github.com/onelogin/ruby-saml/commit/a571f52171e6bfd87db59822d1d9e8c38fb3b995