First published: Wed Mar 22 2023(Updated: )
The crewjam/saml go library contains a partial implementation of the SAML standard in golang. Prior to version 0.4.13, the package's use of `flate.NewReader` does not limit the size of the input. The user can pass more than 1 MB of data in the HTTP request to the processing functions, which will be decompressed server-side using the Deflate algorithm. Therefore, after repeating the same request multiple times, it is possible to achieve a reliable crash since the operating system kills the process. This issue is patched in version 0.4.13.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Saml Project Saml | =0.4.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-28119 is a vulnerability in the crewjam/saml go library that allows an attacker to pass more than 1 MB of data in the HTTP request to the processing functions, leading to potential denial of service or other security issues.
CVE-2023-28119 affects Saml Project Saml version 0.4.12 by allowing an attacker to bypass input size limits and pass more than 1 MB of data in the HTTP request, potentially causing denial of service or other security issues.
CVE-2023-28119 has a severity rating of 7.5 (High).
To fix CVE-2023-28119 in crewjam/saml version 0.4.12, you should upgrade to version 0.4.13 or later, which addresses the vulnerability.
Yes, you can find more information about CVE-2023-28119 in the advisory provided by the crewjam/saml library: [here](https://github.com/crewjam/saml/security/advisories/GHSA-5mqj-xc49-246p)