Ruby SAML allows remote Denial of Service (DoS) with compressed SAML responses
        
  High severity
        
          GitHub Reviewed
      
        Published
          Mar 12, 2025 
          in
          
            SAML-Toolkits/ruby-saml
          
          •
          Updated Sep 13, 2025 
      
  
Package
Affected versions
< 1.12.4
      >= 1.13.0, < 1.18.0
  Patched versions
1.12.4
      1.18.0
  Description
        Published to the GitHub Advisory Database
      Mar 12, 2025 
    
  
        Reviewed
      Mar 12, 2025 
    
  
        Published by the National Vulnerability Database
      Mar 12, 2025 
    
  
        Last updated
      Sep 13, 2025 
    
  
Summary
ruby-saml is susceptible to remote Denial of Service (DoS) with compressed SAML responses.
Ruby-saml uses zlib to decompress SAML responses in case they're compressed. It is possible to bypass the message size check with a compressed assertion since the message size is checked before inflation and not after.
Impact
This issue may lead to remote Denial of Service (DoS).
References