A bug in SAML authentication library can result in Denial of Service attacks.
Attackers can craft a "deflate"-compressed request which will consume significantly more memory during processing than the size of the original request. This may eventually lead to memory exhaustion and the process being killed.
{ "review_status": "REVIEWED", "url": "https://pkg.go.dev/vuln/GO-2023-1602" }
{ "imports": [ { "path": "github.com/russellhaering/gosaml2", "symbols": [ "DecodeUnverifiedBaseResponse", "DecodeUnverifiedLogoutResponse", "SAMLServiceProvider.RetrieveAssertionInfo", "SAMLServiceProvider.ValidateEncodedLogoutRequestPOST", "SAMLServiceProvider.ValidateEncodedLogoutResponsePOST", "SAMLServiceProvider.ValidateEncodedResponse", "SAMLServiceProvider.validationContext", "maybeDeflate", "parseResponse" ] } ] }