Ruby-SAML / GitLab Authentication Bypass

Discussion in 'News Aggregator' started by Packet Storm, 8 Oct 2024.

  1. Packet Storm

    Packet Storm Guest

    This script exploits the issue noted in CVE-2024-45409 that allows an unauthenticated attacker with access to any signed SAML document issued by the IDP to forge a SAML Response/Assertion and gain access as any user on GitLab. Ruby-SAML versions below or equal to 12.2 and versions 1.13.0 through 1.16.0 do not properly verify the signature of the SAML Response.

    Continue reading...
     

Share This Page

Loading...