GitLab Patches: Severe SAML Authentication Bypass Flaw Fixed - Security Boulevard

In addition to these patches, OmniAuth SAML has been upgraded to version 2.2.1 and Ruby-SAML to 1.17.0. It’s worth mentioning that the issue only impacts self-managed instances; therefore, users of GitLab Dedicated instances do not need to take any action. As of now, GitLab patches aiming to fix the flaw have been released; however, if the fixes had not been released, potential exploits of the flaw may have been detrimental. The ruby-saml library flaw, for which GitLab patches have been released, was tracked CVE-2024-45409. However, media reports have claimed that GitLab indicated exploit attempts and success pertaining to the flaw for which the GitLab patches are released. The post GitLab Patches: Severe SAML Authentication Bypass Flaw Fixed appeared first on TuxCare. The critical SAML authentication bypass flaw posed a significant threat to GitLab’s self-managed instances. While no active exploitation has been confirmed, applying the released GitLab patches is crucial for reducing potential risks. A critical SAML authentication bypass flaw was recently identified in GitLab’s Community Edition (CE) and Enterprise Edition (EE). Users who have the affected version are requested to promptly apply the GitLab patches by updating to a secure version, as it can drastically decrease threat exposure. In this article, we’ll dive into the details of the flaw and the patches while covering its severity, root cause, and more. The flaw had a critical vulnerability severity score (CVSS) of 10.0, meaning that exploits could have led attackers to have significant benefits, allowing them to cause further damage. The root cause, and why patches were required, was the library not adequately verifying signatures of the SAML response.

This Cyber News was published on securityboulevard.com. Publication date: Tue, 01 Oct 2024 11:13:07 +0000


Cyber News related to GitLab Patches: Severe SAML Authentication Bypass Flaw Fixed - Security Boulevard

GitLab Patches: Severe SAML Authentication Bypass Flaw Fixed - Security Boulevard - In addition to these patches, OmniAuth SAML has been upgraded to version 2.2.1 and Ruby-SAML to 1.17.0. It’s worth mentioning that the issue only impacts self-managed instances; therefore, users of GitLab Dedicated instances do not need to take any ...
1 year ago Securityboulevard.com CVE-2024-45409
GitLab patches critical authentication bypass vulnerabilities - GitLab released security updates for Community Edition (CE) and Enterprise Edition (EE), fixing nine vulnerabilities, among which two critical severity ruby-saml library authentication bypass flaws. The two critical flaws GitLab addressed this time ...
10 months ago Bleepingcomputer.com CVE-2025-25291
CVE-2023-29129 - A vulnerability has been identified in Mendix SAML (Mendix 7 compatible) (All versions > V1.17.3 < V1.18.0), Mendix SAML (Mendix 7 compatible) (All versions > V1.16.4 < V1.17.3), Mendix SAML (Mendix 8 compatible) (All versions > V2.3.0 ...
2 years ago
Critical ruby-saml Vulnerabilities Let Attackers Bypass Authentication - Security researchers from GitHub Security Lab have identified parser differential vulnerabilities (CVE-2025-25291 and CVE-2025-25292) affecting ruby-saml versions up to 1.17.0, which could allow attackers to impersonate any user within affected ...
10 months ago Cybersecuritynews.com CVE-2025-25291
GitLab Warns of Multiple Vulnerabilities Let Attackers Login as Valid User - Security experts recommend that organizations running GitLab implement these updates as soon as possible, especially those using SAML authentication or considering enabling the Direct Transfer feature. The vulnerability can be exploited if an ...
10 months ago Cybersecuritynews.com CVE-2025-27407
25 Best Managed Security Service Providers (MSSP) - 2025 - Pros & Cons: ProsConsStrong threat intelligence & expert SOCs.High pricing for SMBs.24/7 monitoring & rapid incident response.Complex UI and steep learning curve.Flexible, scalable, hybrid deployments.Limited visibility into endpoint ...
6 months ago Cybersecuritynews.com
CVE-2022-23610 - wire-server provides back end services for Wire, an open source messenger. In versions of wire-server prior to the 2022-01-27 release, it was possible to craft DSA Signatures to bypass SAML SSO and impersonate any Wire user with SAML credentials. In ...
3 years ago
Auto-Generated Password Vulnerability In Sitevision Leaks Signing Key - A critical security flaw in Sitevision CMS versions 10.3.1 and older has exposed SAML authentication signing keys, enabling potential authentication bypass and session hijacking. In non-default configurations, the /webdav/files/ directory became ...
10 months ago Cybersecuritynews.com CVE-2022-35202
CVE-2023-48703 - RobotsAndPencils go-saml, a SAML client library written in Go, contains an authentication bypass vulnerability in all known versions. This is due to how the `xmlsec1` command line tool is called internally to verify the signature of SAML assertions. ...
1 year ago
GitLab Fixes Password Reset Bug That Allows Account Takeover - GitLab is releasing a patch to fix a vulnerability in its email verification process that bad actors can exploit to reset user passwords and take over accounts. The flaw, CVE-2023-7028, was introduced in May 2023 in GitLab 16.1.0, in which a change ...
1 year ago Securityboulevard.com CVE-2023-7028 CVE-2023-5356
CVE-2024-41107 - The CloudStack SAML authentication (disabled by default) does not enforce signature check. In CloudStack environments where SAML authentication is enabled, an attacker that initiates CloudStack SAML single sign-on authentication can bypass SAML ...
10 months ago
Selecting an Authentication Protocol for Your Business - Authentication protocols serve as the backbone of online security, enabling users to confirm their identities securely and access protected information and services. The protocols exchange information to verify the validity of the authentication ...
1 year ago Darkreading.com
CVE-2022-39300 - node SAML is a SAML 2.0 library based on the SAML implementation of passport-saml. A remote attacker may be able to bypass SAML authentication on a website using passport-saml. A successful attack requires that the attacker is in possession of an ...
3 years ago
2FA-less GitLab users vulnerable to account takeovers The Register - GitLab admins should apply the latest batch of security patches pronto given the new critical account-bypass vulnerability just disclosed. Tracked as CVE-2023-7028, the maximum-severity bug exploits a change introduced in version 16.1.0 back in May ...
1 year ago Go.theregister.com CVE-2023-7028 CVE-2023-5356 CVE-2023-4812 CVE-2023-6955 CVE-2023-2030
GitLab warns of critical zero-click account hijacking vulnerability - GitLab has released security updates for both the Community and Enterprise Edition to address two critical vulnerabilities, one of them allowing account hijacking with no user interaction. The most critical security issue GitLab patched has the ...
2 years ago Bleepingcomputer.com CVE-2023-7028 CVE-2023-5356 CVE-2023-4812 CVE-2023-6955 CVE-2023-2030
CVE-2022-44457 - A vulnerability has been identified in Mendix SAML (Mendix 7 compatible) (All versions < V1.17.0), Mendix SAML (Mendix 7 compatible) (All versions > V1.17.0 < V1.17.2), Mendix SAML (Mendix 8 compatible) (All versions < V2.3.0), Mendix ...
3 years ago
CVE-2022-39299 - Passport-SAML is a SAML 2.0 authentication provider for Passport, the Node.js authentication library. A remote attacker may be able to bypass SAML authentication on a website using passport-saml. A successful attack requires that the attacker is in ...
2 years ago
CVE-2025-10703 - Improper Control of Generation of Code ('Code Injection') vulnerability in Progress DataDirect Connect for JDBC drivers, Progress DataDirect Open Access JDBC driver and Hybrid Data Pipeline allows Remote Code Inclusion. ...
1 month ago
CVE-2025-10702 - Improper Control of Generation of Code ('Code Injection') vulnerability in Progress DataDirect Connect for JDBC drivers, Progress DataDirect Open Access JDBC driver and Hybrid Data Pipeline allows Remote Code Inclusion. ...
1 month ago
GitLab Security Update - Patch for Multiple Vulnerabilities in Community and Enterprise Edition - Both vulnerabilities were discovered by security researcher joaxcar through the HackerOne platform, highlighting the effectiveness of GitLab’s bug bounty program in identifying critical security flaws. These vulnerabilities collectively ...
5 months ago Cybersecuritynews.com CVE-2025-4700
New ISC Security Patches Released for 2021: What You Need to Know - The Internet Systems Consortium (ISC), the largest provider of open-source Internet infrastructure software, has released new security patches designed to mitigate data breaches and other cyber threats. These new security patches, released in January ...
2 years ago Thehackernews.com
CVE-2023-25957 - A vulnerability has been identified in Mendix SAML (Mendix 7 compatible) (All versions > V1.16.4 < V1.17.3), Mendix SAML (Mendix 8 compatible) (All versions > V2.2.0 < V2.3.0), Mendix SAML (Mendix 9 latest compatible, New Track) (All ...
2 years ago
Passwordless Login: Effortless Authentication - Let's explore how passwordless login paves the way for seamless and secure user authentication, fostering trust and loyalty. The Password Dilemma Though conventional complex password-based authentication has long been a cornerstone of robust ...
1 year ago Feeds.dzone.com
CVE-2023-52240 - The Kantega SAML SSO OIDC Kerberos Single Sign-on apps before 6.20.0 for Atlassian products allow XSS if SAML POST Binding is enabled. This affects 4.4.2 through 4.14.8 before 4.14.9, 5.0.0 through 5.11.4 before 5.11.5, and 6.0.0 through 6.19.0 ...
2 years ago
Critical GitLab bug lets attackers run pipelines as any user - A critical vulnerability is affecting certain versions of GitLab Community and Enterprise Edition products, which could be exploited to run pipelines as any user. GitLab is a popular web-based open-source software project management and work tracking ...
1 year ago Bleepingcomputer.com CVE-2024-5655 CVE-2024-4901 CVE-2024-4994 CVE-2024-6323