{"id":"CVE-2015-20108","details":"xml_security.rb in the ruby-saml gem before 1.0.0 for Ruby allows XPath injection and code execution because prepared statements are not used.","aliases":["GHSA-r364-2pj4-pf7f"],"modified":"2026-01-27T04:13:51.631950Z","published":"2023-05-27T19:15:09Z","withdrawn":"2026-01-27T04:13:51.631950Z","references":[{"type":"ADVISORY","url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/ruby-saml/OSVDB-124991.yml"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20230703-0003/"},{"type":"FIX","url":"https://github.com/SAML-Toolkits/ruby-saml/commit/9853651b96b99653ea8627d757d46bfe62ab6448"},{"type":"FIX","url":"https://github.com/SAML-Toolkits/ruby-saml/compare/v0.9.2...v1.0.0"},{"type":"REPORT","url":"https://github.com/SAML-Toolkits/ruby-saml/pull/225"}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}