OneLogin Ruby-SAML 1.6.0 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.
{
"nvd_published_at": null,
"github_reviewed": true,
"cwe_ids": [
"CWE-287"
],
"severity": "HIGH",
"github_reviewed_at": "2020-06-16T22:01:42Z"
}