CVE-2023-28119

The crewjam/saml go library contains a partial implementation of the SAML standard in golang. Prior to version 0.4.13, the package's use of `flate.NewReader` does not limit the size of the input. The user can pass more than 1 MB of data in the HTTP request to the processing functions, which will be decompressed server-side using the Deflate algorithm. Therefore, after repeating the same request multiple times, it is possible to achieve a reliable crash since the operating system kills the process. This issue is patched in version 0.4.13.
Configurations

Configuration 1 (hide)

cpe:2.3:a:saml_project:saml:0.4.12:*:*:*:*:go:*:*

History

21 Nov 2024, 07:54

Type Values Removed Values Added
References () https://github.com/crewjam/saml/commit/8e9236867d176ad6338c870a84e2039aef8a5021 - Patch () https://github.com/crewjam/saml/commit/8e9236867d176ad6338c870a84e2039aef8a5021 - Patch
References () https://github.com/crewjam/saml/security/advisories/GHSA-5mqj-xc49-246p - Vendor Advisory () https://github.com/crewjam/saml/security/advisories/GHSA-5mqj-xc49-246p - Vendor Advisory

28 Mar 2023, 16:57

Type Values Removed Values Added
New CVE

Information

Published : 2023-03-22 20:15

Updated : 2024-11-21 07:54


NVD link : CVE-2023-28119

Mitre link : CVE-2023-28119

CVE.ORG link : CVE-2023-28119


JSON object : View

Products Affected

saml_project

  • saml
CWE
CWE-770

Allocation of Resources Without Limits or Throttling