Get the latest tech news

Ruby-SAML pwned by XML signature wrapping attacks


GitLab and others are affected. The blame lies in the SAML specification, and in credulous engineers that implement it.

People hate on JWT because it forgot about (4); it’s part of an overarching attempt to standardize all of crypto under something called JOSE(and COSE), a bad idea. But Ruby-SAML has no reliable way of validating which parts of an XML document were signed, and so I wouldn’t be surprised if there were more issues in that codebase lurking. Responsible engineers should disregard what the SAML and XML Signatures spec authors wrote down, and instead implement the secure thing at its core.

Get the Android app

Or read this on Hacker News

Read more on:

Photo of SAML

SAML

Photo of xml

xml

Related news:

News photo

Defusedxml – defusing XML bombs and other exploits

News photo

Dasel: Select, put and delete data from JSON, TOML, YAML, XML and CSV

News photo

Launch HN: SSOReady (YC W24) – Making SAML SSO painless and open source