In versions prior to v0.7.0 it was possible for an attacker to supply an invalid assertion which would trigger a panic due to a nil-pointer dereference.
The issue was patched in v0.7.0, released on March 2, 2022.
Callers to gosaml2 can use recover() to handle panics to mitigate a potential DoS.
See issue #59 for details.
{
"severity": "HIGH",
"github_reviewed": true,
"cwe_ids": [
"CWE-476"
],
"nvd_published_at": null,
"github_reviewed_at": "2022-11-15T19:05:07Z"
}