VYPR
High severityNVD Advisory· Published Apr 17, 2019· Updated Aug 5, 2024

Multiple SAML libraries may allow authentication bypass via incorrect XML canonicalization and DOM traversal

CVE-2017-11428

Description

OneLogin Ruby-SAML 1.6.0 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Ruby-SAML before 1.7.0 mishandles XML DOM traversal and canonicalization, allowing attackers to modify SAML data without breaking the signature, potentially bypassing authentication.

Root

Cause

The vulnerability arises from incorrect use of XML DOM traversal and canonicalization APIs in OneLogin Ruby-SAML versions 1.6.0 and earlier. Specifically, these APIs handle comments inside XML nodes inconsistently, causing the library to lose inner text after a comment before cryptographically signing the SAML message. As a result, the signature covers only part of the content, enabling an attacker to insert arbitrary data after a comment without invalidating the signature [1] [3].

Exploitation

An attacker can exploit this by crafting a SAML assertion that contains a comment before malicious modifications. Since the signature is computed on the truncated text, any subsequent changes after the comment remain undetected. The attack does not require authentication and can be performed remotely by intercepting or manipulating SAML messages [2] [3].

Impact

Successful exploitation allows an unauthenticated remote attacker to modify the SAML assertion content (e.g., change the user identifier or attributes) and potentially bypass authentication to SAML service providers. This can lead to unauthorized access to applications and systems relying on the affected Ruby-SAML library [1] [3].

Mitigation

The issue is fixed in Ruby-SAML version 1.7.0 and later. Organizations using affected versions should update immediately. The same class of vulnerability also affects other SAML libraries (python-saml, saml2-js, OmniAuth-SAML, Shibboleth openSAML, and Wizkunde SAMLBase) [3]. No workaround is available; applying the patch is the only remediation.

AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
ruby-samlRubyGems
< 1.7.01.7.0

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.