The crewjam/saml go library contains a partial implementation of the SAML standard in golang. Prior to version 0.4.13, the package's use of `flate.NewReader` does not limit the size of the input. The user can pass more than 1 MB of data in the HTTP request to the processing functions, which will be decompressed server-side using the Deflate algorithm. Therefore, after repeating the same request multiple times, it is possible to achieve a reliable crash since the operating system kills the process. This issue is patched in version 0.4.13.
References
Configurations
History
21 Nov 2024, 07:54
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/crewjam/saml/commit/8e9236867d176ad6338c870a84e2039aef8a5021 - Patch | |
References | () https://github.com/crewjam/saml/security/advisories/GHSA-5mqj-xc49-246p - Vendor Advisory |
28 Mar 2023, 16:57
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-03-22 20:15
Updated : 2024-11-21 07:54
NVD link : CVE-2023-28119
Mitre link : CVE-2023-28119
CVE.ORG link : CVE-2023-28119
JSON object : View
Products Affected
saml_project
- saml
CWE
CWE-770
Allocation of Resources Without Limits or Throttling