Skip to content

Commit a058598

Browse files
authored
Merge pull request #754 from johnnyshields/v2.x-master-merge-20250313
[READY] V2.x - Merge in latest master branch
2 parents 8feeb8c + 3313955 commit a058598

File tree

2 files changed

+10
-8
lines changed

2 files changed

+10
-8
lines changed

CHANGELOG.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -21,8 +21,9 @@
2121
* [#731](https://github.com/SAML-Toolkits/ruby-saml/pull/731) Add CI coverage for Ruby 3.4. Remove CI coverage for Ruby 1.x and 2.x.
2222
* [#735](https://github.com/SAML-Toolkits/ruby-saml/pull/735) Add `Settings#sp_uuid_prefix` and deprecate `Utils#set_prefix`.
2323

24-
### 1.18.0 (???)
25-
* [#718](https://github.com/SAML-Toolkits/ruby-saml/pull/718) Add support to retrieve from SAMLResponse the AuthnInstant and AuthnContextClassRef values
24+
### 1.18.0 (Mar 12, 2025)
25+
* [#750](https://github.com/SAML-Toolkits/ruby-saml/pull/750) Fix vulnerabilities: CVE-2025-25291, CVE-2025-25292: SAML authentication bypass via Signature Wrapping attack allowed due parser differential. Fix vulnerability: CVE-2025-25293: Potential DOS abusing of compressed messages.
26+
* [#718](https://github.com/SAML-Toolkits/ruby-saml/pull/718/) Add support to retrieve from SAMLResponse the AuthnInstant and AuthnContextClassRef values
2627
* [#720](https://github.com/SAML-Toolkits/ruby-saml/pull/720) Fix ambiguous regex warnings
2728
* [#715](https://github.com/SAML-Toolkits/ruby-saml/pull/715) Fix typo in SPNameQualifier error text
2829

@@ -67,6 +68,9 @@
6768
* Add warning about the use of IdpMetadataParser class and SSRF
6869
* CI: Migrate from Travis to Github Actions
6970

71+
### 1.12.4 (Mar 12, 2025)
72+
* [#750](https://github.com/SAML-Toolkits/ruby-saml/pull/750) Fix vulnerabilities: CVE-2025-25291, CVE-2025-25292: SAML authentication bypass via Signature Wrapping attack allowed due parser differential. Fix vulnerability: CVE-2025-25293: Potential DOS abusing of compressed messages.
73+
7074
### 1.12.3 (Sep 10, 2024)
7175
* Fix for critical vulnerability CVE-2024-45409: SAML authentication bypass via Incorrect XPath selector
7276

@@ -299,7 +303,7 @@
299303
* [#138](https://github.com/SAML-Toolkits/ruby-saml/pull/138) Change logoutrequest.rb to UTC time
300304
* [#136](https://github.com/SAML-Toolkits/ruby-saml/pull/136) Remote idp metadata
301305
* [#135](https://github.com/SAML-Toolkits/ruby-saml/pull/135) Restored support for NIL as well as empty AttributeValues
302-
* [#134](https://github.com/SAML-Toolkits/ruby-saml/pull/134) explicitly require "ruby_saml/logging"
306+
* [#134](https://github.com/SAML-Toolkits/ruby-saml/pull/134) explicitly require "onelogin/ruby-saml/logging"
303307
* [#133](https://github.com/SAML-Toolkits/ruby-saml/pull/133) Added license to gemspec
304308
* [#132](https://github.com/SAML-Toolkits/ruby-saml/pull/132) Support AttributeConsumingServiceIndex in AuthnRequest
305309
* [#131](https://github.com/SAML-Toolkits/ruby-saml/pull/131) Add ruby 2.1.1 to .travis.yml

lib/ruby_saml/saml_message.rb

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -20,15 +20,13 @@ class SamlMessage
2020
PROTOCOL = "urn:oasis:names:tc:SAML:2.0:protocol"
2121

2222
BASE64_FORMAT = %r{\A([A-Za-z0-9+/]{4})*([A-Za-z0-9+/]{2}==|[A-Za-z0-9+/]{3}=)?\Z}
23-
@@mutex = Mutex.new
2423

2524
# @return [Nokogiri::XML::Schema] Gets the schema object of the SAML 2.0 Protocol schema
2625
#
2726
def self.schema
28-
@@mutex.synchronize do
29-
Dir.chdir(File.expand_path('../../lib/ruby_saml/schemas', __dir__)) do
30-
::Nokogiri::XML::Schema(File.read("saml-schema-protocol-2.0.xsd"))
31-
end
27+
path = File.expand_path('schemas/saml-schema-protocol-2.0.xsd', __dir__)
28+
File.open(path) do |file|
29+
::Nokogiri::XML::Schema(file)
3230
end
3331
end
3432

0 commit comments

Comments
 (0)