PT-2025-31391 · Ruby-Saml +1 · Ruby-Saml +1
Dblessing
·
Published
2025-07-30
·
Updated
2025-08-01
·
CVE-2025-54572
6.9
Medium
Base vector | Vector | AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N |
**Name of the Vulnerable Software and Affected Versions:**
ruby-saml versions 1.18.0 and below
**Description:**
The Ruby SAML library, used for implementing the client side of a SAML authorization, contains a denial-of-service vulnerability. The `message max bytesize` setting, intended to prevent resource exhaustion, is ineffective due to the order of operations in the code. Specifically, the SAML response is validated for Base64 format before checking the message size. This can lead to excessive memory consumption, high CPU utilization, application slowdowns, and potential application crashes, ultimately resulting in a denial of service for legitimate users. The vulnerability exists in the `decode raw saml` function where the `base64 encoded?` function performs regex matching on the entire input string before checking the message size.
**Recommendations:**
ruby-saml versions prior to 1.18.1 are affected.
Update to version 1.18.1 or later to resolve this issue.
Fix
DoS
Allocation of Resources Without Limits
Resource Exhaustion
Related Identifiers
Affected Products
References · 16
- https://osv.dev/vulnerability/CVE-2025-54572 · Vendor Advisory
- https://security-tracker.debian.org/tracker/source-package/ruby-saml · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-54572 · Security Note
- https://security-tracker.debian.org/tracker/CVE-2025-54572 · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54572 · Security Note
- https://osv.dev/vulnerability/GHSA-rrqh-93c8-j966 · Vendor Advisory
- https://github.com/SAML-Toolkits/ruby-saml/commit/38ef5dd1ce17514e202431f569c4f5633e6c2709⭐ 954 🔗 588 · Note
- https://github.com/SAML-Toolkits/ruby-saml/security/advisories/GHSA-rrqh-93c8-j966⭐ 954 🔗 588 · Note
- https://github.com/SAML-Toolkits/ruby-saml⭐ 954 🔗 588 · Note
- https://github.com/SAML-Toolkits/ruby-saml/pull/770⭐ 954 🔗 588 · Note
- https://github.com/SAML-Toolkits/ruby-saml/releases/tag/v1.18.1⭐ 954 🔗 588 · Note
- https://twitter.com/CVEnew/status/1950562084686856424 · Twitter Post
- https://t.me/CVEtracker/28744 · Telegram Post
- https://twitter.com/rubylandnews/status/1951362375086403766 · Twitter Post
- https://packages.debian.org/src:ruby-saml · Note