In versions prior to v0.7.0 it was possible for an attacker to supply an invalid assertion which would trigger a panic due to a nil-pointer dereference.
The issue was patched in v0.7.0, released on March 2, 2022.
Callers to gosaml2
can use recover()
to handle panics to mitigate a potential DoS.
See issue #59 for details.
{ "nvd_published_at": null, "cwe_ids": [ "CWE-476" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2022-11-15T19:05:07Z" }