Vulnerabilities > Omniauth
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-09-10 | CVE-2024-45409 | Improper Verification of Cryptographic Signature vulnerability in multiple products The Ruby SAML library is for implementing the client side of a SAML authorization. | 9.8 |
2022-08-18 | CVE-2020-36599 | Improper Encoding or Escaping of Output vulnerability in Omniauth lib/omniauth/failure_endpoint.rb in OmniAuth before 1.9.2 (and before 2.0) does not escape the message_key value. | 9.8 |
2019-04-26 | CVE-2015-9284 | Cross-Site Request Forgery (CSRF) vulnerability in Omniauth The request phase of the OmniAuth Ruby gem (1.9.1 and earlier) is vulnerable to Cross-Site Request Forgery when used as part of the Ruby on Rails framework, allowing accounts to be connected without user intent, user interaction, or feedback to the user. | 8.8 |
2019-04-17 | CVE-2017-11430 | Improper Authentication vulnerability in Omniauth Saml OmniAuth OmnitAuth-SAML 1.9.0 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers. | 9.8 |
2018-01-26 | CVE-2017-18076 | In strategy.rb in OmniAuth before 1.3.2, the authenticity_token value is improperly protected because POST (in addition to GET) parameters are stored in the session and become available in the environment of the callback phase. | 5.0 |