vulnerability
FreeBSD: ruby-saml -- XML signature wrapping attack (CVE-2016-5697)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:L/Au:N/C:N/I:P/A:N) | Jun 24, 2016 | Jul 20, 2016 | Oct 30, 2017 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:P/A:N)
Published
Jun 24, 2016
Added
Jul 20, 2016
Modified
Oct 30, 2017
Description
RubySec reports:
ruby-saml prior to version 1.3.0 is vulnerable to an XML signature wrapping attack
in the specific scenario where there was a signature that referenced at the same
time 2 elements (but past the scheme validator process since 1 of the element was
inside the encrypted assertion).
ruby-saml users must update to 1.3.0, which implements 3 extra validations to
mitigate this kind of attack.
Solution
freebsd-upgrade-package-rubygem-ruby-saml
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.