Multiple SAML libraries may allow authentication bypass via incorrect XML canonicalization and DOM traversal
Description
OneLogin Ruby-SAML 1.6.0 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Ruby-SAML before 1.7.0 mishandles XML DOM traversal and canonicalization, allowing attackers to modify SAML data without breaking the signature, potentially bypassing authentication.
Root
Cause
The vulnerability arises from incorrect use of XML DOM traversal and canonicalization APIs in OneLogin Ruby-SAML versions 1.6.0 and earlier. Specifically, these APIs handle comments inside XML nodes inconsistently, causing the library to lose inner text after a comment before cryptographically signing the SAML message. As a result, the signature covers only part of the content, enabling an attacker to insert arbitrary data after a comment without invalidating the signature [1] [3].
Exploitation
An attacker can exploit this by crafting a SAML assertion that contains a comment before malicious modifications. Since the signature is computed on the truncated text, any subsequent changes after the comment remain undetected. The attack does not require authentication and can be performed remotely by intercepting or manipulating SAML messages [2] [3].
Impact
Successful exploitation allows an unauthenticated remote attacker to modify the SAML assertion content (e.g., change the user identifier or attributes) and potentially bypass authentication to SAML service providers. This can lead to unauthorized access to applications and systems relying on the affected Ruby-SAML library [1] [3].
Mitigation
The issue is fixed in Ruby-SAML version 1.7.0 and later. Organizations using affected versions should update immediately. The same class of vulnerability also affects other SAML libraries (python-saml, saml2-js, OmniAuth-SAML, Shibboleth openSAML, and Wizkunde SAMLBase) [3]. No workaround is available; applying the patch is the only remediation.
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
ruby-samlRubyGems | < 1.7.0 | 1.7.0 |
Affected products
2- OneLogin/Ruby-SAMLv5Range: unspecified
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-x2fr-v8wf-8wwvghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2017-11428ghsaADVISORY
- duo.com/blog/duo-finds-saml-vulnerabilities-affecting-multiple-implementationsghsax_refsource_MISCWEB
- www.kb.cert.org/vuls/id/475445ghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.