Show filters
9 Total Results
Displaying 1-9 of 9
Sort by:
Attacker Value
Unknown

CVE-2024-45409

Disclosure Date: September 10, 2024 (last updated September 21, 2024)
The Ruby SAML library is for implementing the client side of a SAML authorization. Ruby-SAML in <= 12.2 and 1.13.0 <= 1.16.0 does not properly verify the signature of the SAML Response. An unauthenticated attacker with access to any signed saml document (by the IdP) can thus forge a SAML Response/Assertion with arbitrary contents. This would allow the attacker to log in as arbitrary user within the vulnerable system. This vulnerability is fixed in 1.17.0 and 1.12.3.
Attacker Value
Unknown

CVE-2020-36599

Disclosure Date: August 18, 2022 (last updated February 24, 2025)
lib/omniauth/failure_endpoint.rb in OmniAuth before 1.9.2 (and before 2.0) does not escape the message_key value.
Attacker Value
Unknown

CVE-2020-26254

Disclosure Date: December 08, 2020 (last updated February 22, 2025)
omniauth-apple is the OmniAuth strategy for "Sign In with Apple" (RubyGem omniauth-apple). In omniauth-apple before version 1.0.1 attackers can fake their email address during authentication. This vulnerability impacts applications using the omniauth-apple strategy of OmniAuth and using the info.email field of OmniAuth's Auth Hash Schema for any kind of identification. The value of this field may be set to any value of the attacker's choice including email addresses of other users. Applications not using info.email for identification but are instead using the uid field are not impacted in the same manner. Note, these applications may still be negatively affected if the value of info.email is being used for other purposes. Applications using affected versions of omniauth-apple are advised to upgrade to omniauth-apple version 1.0.1 or later.
Attacker Value
Unknown

CVE-2019-17268

Disclosure Date: February 07, 2020 (last updated February 21, 2025)
The omniauth-weibo-oauth2 gem 0.4.6 for Ruby, as distributed on RubyGems.org, included a code-execution backdoor inserted by a third party. Versions through 0.4.5, and 0.5.1 and later, are unaffected.
Attacker Value
Unknown

CVE-2013-4593

Disclosure Date: December 11, 2019 (last updated November 27, 2024)
RubyGem omniauth-facebook has an access token security vulnerability
Attacker Value
Unknown

CVE-2015-9284

Disclosure Date: April 26, 2019 (last updated February 15, 2024)
The request phase of the OmniAuth Ruby gem (1.9.1 and earlier) is vulnerable to Cross-Site Request Forgery when used as part of the Ruby on Rails framework, allowing accounts to be connected without user intent, user interaction, or feedback to the user. This permits a secondary account to be able to sign into the web application as the primary account.
Attacker Value
Unknown

Multiple SAML libraries may allow authentication bypass via incorrect XML cano…

Disclosure Date: April 17, 2019 (last updated September 21, 2024)
OmniAuth OmnitAuth-SAML 1.9.0 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.
0
Attacker Value
Unknown

CVE-2017-18076

Disclosure Date: January 26, 2018 (last updated November 26, 2024)
In strategy.rb in OmniAuth before 1.3.2, the authenticity_token value is improperly protected because POST (in addition to GET) parameters are stored in the session and become available in the environment of the callback phase.
Attacker Value
Unknown

CVE-2012-6134

Disclosure Date: April 09, 2013 (last updated October 05, 2023)
Cross-site request forgery (CSRF) vulnerability in the omniauth-oauth2 gem 1.1.1 and earlier for Ruby allows remote attackers to hijack the authentication of users for requests that modify session state.
0