skip to content
Decrypt LOL

Get Cyber-Smart in Just 5 Minutes a Week

Decrypt delivers quick and insightful updates on cybersecurity. No spam, no data sharing—just the info you need to stay secure.

Read the latest edition
Critical Security Vulnerability Disclosed in Ruby-SAML Libraries

Critical Security Vulnerability Disclosed in Ruby-SAML Libraries

/ 3 min read

Quick take - On September 10, 2024, a critical security vulnerability (CVE-2024-45409) was disclosed in the Ruby-SAML and OmniAuth-SAML libraries, allowing for complete authentication bypass and posing significant risks to systems, including GitLab, prompting the release of patches and raising concerns about the security of open-source software.

Fast Facts

  • A critical security vulnerability (CVE-2024-45409) was disclosed in Ruby-SAML and OmniAuth-SAML libraries on September 10, 2024, scoring a maximum severity of 10 on GitHub’s CVE rubric and 9.8 on the NIST base score.
  • The flaw allows complete authentication bypass, enabling attackers to log in as any user, including administrators, posing significant risks to systems like GitLab.
  • Attackers can exploit the vulnerability to access sensitive information, modify software URLs, and embed malware, with the flaw remaining undetected for over a decade.
  • GitLab has released patches for affected versions, and users are advised to update their OmniAuth-SAML and Ruby SAML libraries to mitigate risks.
  • The incident raises concerns about the security of open-source software, challenging the “many eyes” theory and highlighting issues like reliance on volunteer maintenance and lack of funding for security audits.

Critical Security Vulnerability Disclosed in Ruby-SAML and OmniAuth-SAML Libraries

On September 10, 2024, a critical security vulnerability was disclosed in the Ruby-SAML and OmniAuth-SAML libraries, identified as CVE-2024-45409. This flaw received a maximum severity score of 10 on GitHub’s CVE rubric and scored 9.8 on the NIST base score, indicating its serious implications. The vulnerability allows for complete authentication bypass, enabling an attacker to log in as any user, including administrators, which poses substantial risks to various systems.

Impact on Systems and GitLab

The impact of CVE-2024-45409 extends beyond the libraries themselves, affecting GitLab, a widely used version control system. Potential risks include unauthorized access to sensitive information from CI/CD systems, such as API keys and database passwords. Attackers could modify software URLs to redirect users to malicious endpoints or embed malware in software distributed widely.

The flaw had remained undetected in the Ruby-SAML library for over a decade, raising concerns regarding the security of open-source software. The vulnerability stems from an overly permissive XPath selector used in the code, affecting how the integrity of the SAML response is verified. Attackers can exploit this flaw by injecting a forged element into a SAML response through several steps:

  1. Obtaining a valid SAML response.
  2. Modifying the SAML response to impersonate a target user.
  3. Crafting a malicious payload.
  4. Submitting the modified response to the service provider, bypassing security checks due to the XPath flaw.
  5. Gaining unauthorized access as the specified user.

Response and Recommendations

In response to the vulnerability, GitLab has released patches for affected versions of both GitLab Community Edition and Enterprise Edition, specifically for versions 17.3.3, 17.2.7, 17.1.8, 17.0.8, and 16.11.10. Users are advised to update their OmniAuth-SAML to version 2.2.1 and Ruby SAML to version 1.17.0 to mitigate the risks. The vulnerability primarily impacts self-managed GitLab instances, while dedicated instances have already been upgraded.

The discovery of CVE-2024-45409 raises questions about the security of open-source software and challenges the “many eyes” theory, which posits that open-source transparency leads to better security outcomes. It highlights several challenges faced by open-source projects, including reliance on volunteer maintenance, increased complexity that can obscure security issues, misconceptions regarding the security of widely-used libraries, and a lack of funding for regular security audits and maintenance.

Collaboration with trusted security experts is recommended to mitigate such vulnerabilities, underscoring the need for ongoing diligence in open-source software security to protect against emerging threats.

Original Source: Read the Full Article Here

Check out what's latest