{"id":"USN-7309-1","summary":"Ruby SAML vulnerabilities","details":"\nIt was discovered that Ruby SAML did not properly validate SAML responses.\nAn unauthenticated attacker could use this vulnerability to log in as an \nabitrary user. This issue only affected Ubuntu 16.04 LTS. (CVE-2016-5697)\n\nIt was discovered that Ruby SAML incorrectly utilized the results of XML\nDOM traversal and canonicalization APIs. An unauthenticated attacker could\nuse this vulnerability to log in as an abitrary user. This issue only \naffected Ubuntu 16.04 LTS. (CVE-2017-11428)\n\nIt was discovered that Ruby SAML did not properly verify the signature of\nthe SAML Response, allowing multiple elements with the same ID. An \nunauthenticated attacker could use this vulnerability to log in as an \nabitrary user. (CVE-2024-45409)\n\n","modified":"2026-05-20T16:03:28.206884448Z","published":"2025-02-28T17:30:52Z","related":["UBUNTU-CVE-2016-5697","UBUNTU-CVE-2017-11428","UBUNTU-CVE-2024-45409"],"upstream":["CVE-2016-5697","CVE-2017-11428","CVE-2024-45409","UBUNTU-CVE-2016-5697","UBUNTU-CVE-2017-11428","UBUNTU-CVE-2024-45409"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7309-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-5697"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-11428"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-45409"}],"affected":[{"package":{"name":"ruby-saml","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/ruby-saml?arch=source&distro=esm-infra-legacy%2Fxenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.1.2-1ubuntu1+esm1"}]}],"versions":["0.9.2-1","1.0.0-1","1.1.2-1ubuntu1"],"ecosystem_specific":{"binaries":[{"binary_name":"ruby-saml","binary_version":"1.1.2-1ubuntu1+esm1"}],"availability":"Available with Ubuntu Pro with Legacy support add-on: https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7309-1.json","cves_map":{"cves":[],"ecosystem":"Ubuntu:Pro:16.04:LTS"}}},{"package":{"name":"ruby-saml","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/ruby-saml?arch=source&distro=esm-apps%2Fbionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.7.2-1ubuntu0.1~esm1"}]}],"versions":["1.4.1-1","1.7.2-1"],"ecosystem_specific":{"binaries":[{"binary_name":"ruby-saml","binary_version":"1.7.2-1ubuntu0.1~esm1"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7309-1.json","cves_map":{"cves":[{"id":"CVE-2024-45409","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:Pro:18.04:LTS"}}},{"package":{"name":"ruby-saml","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/ruby-saml?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.11.0-1ubuntu0.1"}]}],"versions":["1.7.2-1","1.11.0-1"],"ecosystem_specific":{"binaries":[{"binary_name":"ruby-saml","binary_version":"1.11.0-1ubuntu0.1"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7309-1.json","cves_map":{"cves":[{"id":"CVE-2024-45409","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:20.04:LTS"}}},{"package":{"name":"ruby-saml","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/ruby-saml?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.13.0-1ubuntu0.1"}]}],"versions":["1.11.0-1","1.13.0-1"],"ecosystem_specific":{"binaries":[{"binary_name":"ruby-saml","binary_version":"1.13.0-1ubuntu0.1"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7309-1.json","cves_map":{"cves":[{"id":"CVE-2024-45409","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:22.04:LTS"}}},{"package":{"name":"ruby-saml","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/ruby-saml?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.15.0-1ubuntu0.24.04.1"}]}],"versions":["1.15.0-1"],"ecosystem_specific":{"binaries":[{"binary_name":"ruby-saml","binary_version":"1.15.0-1ubuntu0.24.04.1"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7309-1.json","cves_map":{"cves":[{"id":"CVE-2024-45409","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:24.04:LTS"}}}],"schema_version":"1.7.5"}