
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2015-20108 affects the xml_security.rb component in the ruby-saml gem versions prior to 1.0.0. The vulnerability was discovered in 2015 and allows XPath injection and code execution due to the lack of prepared statements (GitHub Commit, NVD).
The vulnerability has been assigned a CVSS v3.1 base score of 9.8 (CRITICAL) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. The issue stems from improper neutralization of special elements used in a command, classified as CWE-77. The vulnerability specifically affects the handling of XML documents where prepared statements are not used in XPath queries (NVD, NetApp Advisory).
Successful exploitation of this vulnerability could lead to disclosure of sensitive information, addition or modification of data, or Denial of Service (DoS). The critical CVSS score indicates that the vulnerability can result in complete compromise of system confidentiality, integrity, and availability (NetApp Advisory).
The vulnerability was fixed in ruby-saml version 1.0.0. Users should upgrade to this version or later to address the security issue. The fix involves proper handling of XPath queries using prepared statements (GitHub Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."