Allocation of Resources Without Limits or Throttling Affecting ruby-saml package, versions <1.12.4>=1.13.0, <1.18.0


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (16th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Allocation of Resources Without Limits or Throttling vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RUBY-RUBYSAML-9402843
  • published13 Mar 2025
  • disclosed12 Mar 2025
  • creditPeter Stöckli

Introduced: 12 Mar 2025

NewCVE-2025-25293  (opens in a new tab)
CWE-770  (opens in a new tab)

How to fix?

Upgrade ruby-saml to version 1.12.4, 1.18.0 or higher.

Overview

Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling in decode_raw_saml(), which does not sufficiently check the size of a compressed SAML response. An attacker can cause the application to consume excessive resources by sending a large compressed message.

References

CVSS Base Scores

version 4.0
version 3.1