Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-0885 | The crewjam/saml go library contains a partial implementation of the SAML standard in golang. Prior to version 0.4.13, the package's use of `flate.NewReader` does not limit the size of the input. The user can pass more than 1 MB of data in the HTTP request to the processing functions, which will be decompressed server-side using the Deflate algorithm. Therefore, after repeating the same request multiple times, it is possible to achieve a reliable crash since the operating system kills the process. This issue is patched in version 0.4.13. |
Github GHSA |
GHSA-5mqj-xc49-246p | crewjam/saml vulnerable to Denial Of Service Via Deflate Decompression Bomb |
Tue, 04 Mar 2025 03:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-02-25T14:51:31.420Z
Reserved: 2023-03-10T18:34:29.228Z
Link: CVE-2023-28119
Updated: 2024-08-02T12:30:24.231Z
Status : Modified
Published: 2023-03-22T20:15:12.877
Modified: 2024-11-21T07:54:26.683
Link: CVE-2023-28119
OpenCVE Enrichment
No data.
EUVD
Github GHSA