You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CHANGELOG.md
+11-6Lines changed: 11 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,6 +21,11 @@
21
21
*[#731](https://github.com/SAML-Toolkits/ruby-saml/pull/731) Add CI coverage for Ruby 3.4. Remove CI coverage for Ruby 1.x and 2.x.
22
22
*[#735](https://github.com/SAML-Toolkits/ruby-saml/pull/735) Add `Settings#sp_uuid_prefix` and deprecate `Utils#set_prefix`.
23
23
24
+
### 1.18.1 (Jul 29, 2025)
25
+
* Fix vulnerability CVE-2025-54572 Prevent DOS due large SAML Message
26
+
* Adapt tests to be able to execute signature validation sooner
27
+
* CI Improvements. Support Ruby 3.4
28
+
24
29
### 1.18.0 (Mar 12, 2025)
25
30
*[#750](https://github.com/SAML-Toolkits/ruby-saml/pull/750) Fix vulnerabilities: CVE-2025-25291, CVE-2025-25292: SAML authentication bypass via Signature Wrapping attack allowed due parser differential. Fix vulnerability: CVE-2025-25293: Potential DOS abusing of compressed messages.
26
31
*[#718](https://github.com/SAML-Toolkits/ruby-saml/pull/718/) Add support to retrieve from SAMLResponse the AuthnInstant and AuthnContextClassRef values
@@ -61,7 +66,7 @@
61
66
*[#614](https://github.com/SAML-Toolkits/ruby-saml/pull/614) Support :name_id_format option for IdpMetadataParser
62
67
*[#611](https://github.com/SAML-Toolkits/ruby-saml/pull/611) IdpMetadataParser should always set idp_cert_multi, even when there is only one cert
63
68
*[#610](https://github.com/SAML-Toolkits/ruby-saml/pull/610) New IDP sso/slo binding params which deprecate :embed_sign
64
-
*[#602](https://github.com/SAML-Toolkits/ruby-saml/pull/602) Refactor the OneLogin::RubySaml::Metadata class
69
+
*[#602](https://github.com/SAML-Toolkits/ruby-saml/pull/602) Refactor the RubySaml::Metadata class
65
70
*[#586](https://github.com/SAML-Toolkits/ruby-saml/pull/586) Support milliseconds in cacheDuration parsing
66
71
*[#585](https://github.com/SAML-Toolkits/ruby-saml/pull/585) Do not append " | " to StatusCode unnecessarily
67
72
*[#607](https://github.com/SAML-Toolkits/ruby-saml/pull/607) Clean up
@@ -136,7 +141,7 @@
136
141
* Updated invalid audience error message
137
142
138
143
### 1.7.2 (Feb 28, 2018)
139
-
*[#446](https://github.com/SAML-Toolkits/ruby-saml/pull/446) Normalize text returned by OneLogin::RubySaml::Utils.element_text
144
+
*[#446](https://github.com/SAML-Toolkits/ruby-saml/pull/446) Normalize text returned by RubySaml::Utils.element_text
140
145
141
146
### 1.7.1 (Feb 28, 2018)
142
147
*[#444](https://github.com/SAML-Toolkits/ruby-saml/pull/444) Fix audience validation for empty audience restriction
@@ -266,7 +271,7 @@
266
271
*[#226](https://github.com/SAML-Toolkits/ruby-saml/pull/226) Ensure IdP certificate is formatted properly
267
272
*[#225](https://github.com/SAML-Toolkits/ruby-saml/pull/225) Add documentation to several methods. Fix xpath injection on xml_security.rb
268
273
*[#223](https://github.com/SAML-Toolkits/ruby-saml/pull/223) Allow logging to be delegated to an arbitrary Logger
269
-
*[#222](https://github.com/SAML-Toolkits/ruby-saml/pull/222) No more silent failure fetching idp metadata (OneLogin::RubySaml::HttpError raised).
274
+
*[#222](https://github.com/SAML-Toolkits/ruby-saml/pull/222) No more silent failure fetching idp metadata (RubySaml::HttpError raised).
270
275
271
276
### 0.9.2 (Apr 28, 2015)
272
277
*[#216](https://github.com/SAML-Toolkits/ruby-saml/pull/216) Add fingerprint algorithm support
@@ -314,10 +319,10 @@
314
319
*[#183](https://github.com/SAML-Toolkits/ruby-saml/pull/183) Resolved a security vulnerability where string interpolation in a `REXML::XPath.first()` method call allowed for arbitrary code execution.
315
320
316
321
### 0.8.0 (Feb 21, 2014)
317
-
**IMPORTANT**: This release changed namespace of the gem from `OneLogin::Saml` to `OneLogin::RubySaml`. Please update your implementations of the gem accordingly.
322
+
**IMPORTANT**: This release changed namespace of the gem from `Saml` to `RubySaml`. Please update your implementations of the gem accordingly.
318
323
319
-
*[#111](https://github.com/SAML-Toolkits/ruby-saml/pull/111)`Onelogin::` is `OneLogin::`
320
-
*[#108](https://github.com/SAML-Toolkits/ruby-saml/pull/108) Change namespacing from `Onelogin::Saml` to `Onelogin::Rubysaml`
324
+
*[#111](https://github.com/SAML-Toolkits/ruby-saml/pull/111)`` is ``
325
+
*[#108](https://github.com/SAML-Toolkits/ruby-saml/pull/108) Change namespacing from `Saml` to `Rubysaml`
321
326
322
327
### 0.7.3 (Feb 20, 2014)
323
328
Updated gem dependencies to be compatible with Ruby 1.8.7-p374 and 1.9.3-p448. Removed unnecessary `canonix` gem dependency.
@@ -379,4 +379,4 @@ Version `0.9` adds many new features and improvements.
379
379
380
380
## Upgrading from 0.7.x to 0.8.x
381
381
382
-
Version `0.8.x` changes the namespace of the gem from `OneLogin::Saml` to `OneLogin::RubySaml`. Please update your implementations of the gem accordingly.
382
+
Version `0.8.x` changes the namespace of the gem from `Saml` to `RubySaml`. Please update your implementations of the gem accordingly.
assert_raises(RubySaml::ValidationError,"Encoded SAML Message exceeds #{RubySaml::Settings::DEFAULTS[:message_max_bytesize]} bytes, so was rejected")do
1760
+
RubySaml::Response.new(large_saml_response)
1761
+
end
1762
+
end
1763
+
1764
+
it"rejects oversized payloads before attempting Base64 validation with custom max_bytesize"do
0 commit comments