A bug in SAML authentication library can result in Denial of Service attacks.
Attackers can craft a "deflate"-compressed request which will consume significantly more memory during processing than the size of the original request. This may eventually lead to memory exhaustion and the process being killed.
{
"url": "https://pkg.go.dev/vuln/GO-2023-1602",
"review_status": "REVIEWED"
}{
"imports": [
{
"path": "github.com/russellhaering/gosaml2",
"symbols": [
"DecodeUnverifiedBaseResponse",
"DecodeUnverifiedLogoutResponse",
"SAMLServiceProvider.RetrieveAssertionInfo",
"SAMLServiceProvider.ValidateEncodedLogoutRequestPOST",
"SAMLServiceProvider.ValidateEncodedLogoutResponsePOST",
"SAMLServiceProvider.ValidateEncodedResponse",
"SAMLServiceProvider.validationContext",
"maybeDeflate",
"parseResponse"
]
}
]
}