Bug Fix: SAML Response Initialize Arguments Passed in the Wrong Order #198
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This fixes an issue in the
SamlIdp::Controller#encode_authn_response
method where arguments where being passed in the wrong order. This issue was introduced in v0.15.0.In the call to
SamlResponse#initialize
the value offalse
forsigned_message_opts
was, by default, getting passed as the argument forsigned_assertion_opts
which caused SAML Responses to be generated without a signed assertion.This wasn't caught in the tests because signed assertions were not checked when validating the SAML response, so a test was added to confirm that the assertion is being signed by default.
This could present a potential security concern, as SAML assertions are typically signed by default. It is expected that SAML Service Providers (SPs) validate these signatures. However, if a user of this gem upgrades to version 0.15.0 and mistakenly assumes that the assertion signature continues to be transmitted, this could lead to a potential security vulnerability.