CVE-2024-45409

Published Sep 10, 2024

Last updated 2 months ago

Insights

Analysis from the Intruder Security Team
Published Oct 7, 2024 Updated Oct 7, 2024

CVE-2024-45409

Attackers could leverage this vulnerability against a GitLab instance to push compromised builds or malicious updates to end users, causing widespread impact across the organization's supply chain.

The Ruby-SAML library used in GitLab versions <= 12.2 and 1.13.0 to 1.16.0 fails to properly verify SAML signatures. This vulnerability (CVE-2024-45409) allows a remote unauthenticated attacker to forge SAML responses, enabling unauthorized access to arbitrary gitlab accounts.

A patch and mitigations to prevent exploitation are available here

Overview

Description
The Ruby SAML library is for implementing the client side of a SAML authorization. Ruby-SAML in <= 12.2 and 1.13.0 <= 1.16.0 does not properly verify the signature of the SAML Response. An unauthenticated attacker with access to any signed saml document (by the IdP) can thus forge a SAML Response/Assertion with arbitrary contents. This would allow the attacker to log in as arbitrary user within the vulnerable system. This vulnerability is fixed in 1.17.0 and 1.12.3.
Source
security-advisories@github.com
NVD status
Analyzed

Risk scores

CVSS 3.1

Type
Primary
Base score
9.8
Impact score
5.9
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity
CRITICAL

Weaknesses

security-advisories@github.com
CWE-347

Social media

Hype score
Not currently trending
  1. Ruby SAML CVE-2024-45409: As bad as it gets and hiding in plain sight https://t.co/w9NMnJa2oo

    @_r_netsec

    13 Nov 2024

    931 Impressions

    4 Retweets

    12 Likes

    4 Bookmarks

    0 Replies

    0 Quotes

  2. Ruby-SAML / GitLab Authentication Bypass (CVE-2024-45409) by @rootxharsh &amp; @iamnoooob https://t.co/nQ6mY8qshm #BBRENewsletter82 https://t.co/7iyxufMuN4

    @gregxsunday

    31 Oct 2024

    179 Impressions

    0 Retweets

    4 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  3. Actively exploited CVE : CVE-2024-45409

    @transilienceai

    30 Oct 2024

    9 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  4. Actively exploited CVE : CVE-2024-45409

    @transilienceai

    29 Oct 2024

    8 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  5. #Vulnerability #CVE202445409 GitLab Releases Critical Security Patch for CVE-2024-45409 (CVSS 10) Vulnerability https://t.co/ZueoB9rcaL

    @Komodosec

    25 Oct 2024

    37 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  6. Actively exploited CVE : CVE-2024-45409

    @transilienceai

    25 Oct 2024

    17 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  7. Actively exploited CVE : CVE-2024-45409

    @transilienceai

    23 Oct 2024

    17 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  8. Actively exploited CVE : CVE-2024-45409

    @transilienceai

    20 Oct 2024

    14 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  9. #Vulnerability #CVE202445409 CVE-2024-45409 (CVSS 10): Critical Ruby-SAML Flaw Leaves User Accounts Exposed https://t.co/jSVQTpbD78

    @Komodosec

    19 Oct 2024

    26 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  10. CVE-2024-45409: Gitlab SAML Authentication Bypass Vulnerability. Account takeover was possible due to insufficient verification of SAML response. https://t.co/SqGej3pZOE

    @hackyboiz

    19 Oct 2024

    1500 Impressions

    7 Retweets

    21 Likes

    12 Bookmarks

    0 Replies

    0 Quotes

  11. Actively exploited CVE : CVE-2024-45409

    @transilienceai

    16 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

Configurations