An authentication bypass exists in the goxmldsig this library uses to determine if SAML assertions are genuine. An attacker could craft a SAML response that would appear to be valid but would not have been genuinely issued by the IDP.
Version 0.4.2 bumps the dependency which should fix the issue.
Please see the advisory in goxmldsig
The original vulnerability was discovered by @jupenur. Thanks to @russellhaering for the heads up.
{ "nvd_published_at": null, "cwe_ids": [ "CWE-347" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2021-05-21T22:23:03Z" }