Skip to content

SAML Attack Based on parser differentials #94

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 2 commits into
base: master
Choose a base branch
from

Conversation

d0ge
Copy link
Contributor

@d0ge d0ge commented May 7, 2025

This commit introduces two automated scans targeting CVE-2025-25291 and CVE-2025-25292 vulnerabilities in the Ruby SAML library. The scans update time-based attributes in SAML documents to simplify exploitation workflows, especially for GitLab testing environments. Test bed as usual available at https://github.com/d0ge/proof-of-concept-labs/tree/main/round-trip but you can test CVE-2025-25291 at Gitlab 17.8.4

This commit introduces two automated scans targeting CVE-2025-25291 and CVE-2025-25292 vulnerabilities in the Ruby SAML library. The scans update time-based attributes in SAML documents to simplify exploitation workflows, especially for GitLab testing environments. Test bed as usual available at https://github.com/d0ge/proof-of-concept-labs/tree/main/round-trip but you can test CVE-2025-25291 at Gitlab 17.8.4
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant