CVE-2015-20108: Improper Neutralization of Special Elements used in a Command ('Command Injection')
(updated )
xml_security.rb in the ruby-saml gem before 1.0.0 for Ruby allows XPath injection and code execution because prepared statements are not used.
References
- github.com/SAML-Toolkits/ruby-saml/commit/9853651b96b99653ea8627d757d46bfe62ab6448
- github.com/SAML-Toolkits/ruby-saml/compare/v0.9.2...v1.0.0
- github.com/SAML-Toolkits/ruby-saml/pull/225
- github.com/advisories/GHSA-r364-2pj4-pf7f
- github.com/rubysec/ruby-advisory-db/blob/master/gems/ruby-saml/CVE-2015-20108.yml
- github.com/rubysec/ruby-advisory-db/blob/master/gems/ruby-saml/OSVDB-124991.yml
- nvd.nist.gov/vuln/detail/CVE-2015-20108
- security.netapp.com/advisory/ntap-20230703-0003/
- security.snyk.io/vuln/SNYK-RUBY-RUBYSAML-20217
Detect and mitigate CVE-2015-20108 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →