CVE-2024-45409

CRITICAL EXPLOITED NUCLEI LAB

Ruby-SAML <=1.16.0 - Auth Bypass

Title source: llm

Description

The Ruby SAML library is for implementing the client side of a SAML authorization. Ruby-SAML in <= 12.2 and 1.13.0 <= 1.16.0 does not properly verify the signature of the SAML Response. An unauthenticated attacker with access to any signed saml document (by the IdP) can thus forge a SAML Response/Assertion with arbitrary contents. This would allow the attacker to log in as arbitrary user within the vulnerable system. This vulnerability is fixed in 1.17.0 and 1.12.3.

Exploits (2)

nomisec WORKING POC 83 stars
by synacktiv · remote
https://github.com/synacktiv/CVE-2024-45409
github WORKING POC 1 stars
by exploitintel · pythonpoc
https://github.com/exploitintel/eip-pocs-and-cves/tree/main/CVE-2024-45409

Nuclei Templates (1)

GitLab - SAML Authentication Bypass
CRITICALVERIFIEDby iamnoooob,rootxharsh,pdresearch
Shodan: http.title:"GitLab"

Scores

CVSS v3 10.0
EPSS 0.4066
EPSS Percentile 97.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N

Lab Environment

Lab screenshot
vulnerable
docker pull ghcr.io/exploitintel/cve-2024-45409-vulnerable:latest
All Labs GitHub

Exploitation Intel

VulnCheck KEV 2024-10-15

Classification

CWE
CWE-347
Status published

Affected Products (6)

onelogin/ruby-saml < 1.12.3
omniauth/omniauth_saml < 1.10.3
omniauth/omniauth_saml
omniauth/omniauth_saml
gitlab/gitlab < 16.11.10
rubygems/ruby-saml < 1.12.3RubyGems

Timeline

Published Sep 10, 2024
Tracked Since Feb 18, 2026