Skip to content

github.com/russellhaering/gosaml2 is vulnerable to NULL Pointer Dereference

High severity GitHub Reviewed Published Nov 10, 2022 in russellhaering/gosaml2 • Updated Aug 30, 2023

Package

gomod github.com/russellhaering/gosaml2 (Go)

Affected versions

< 0.7.0

Patched versions

0.7.0
gomod github.com/russellhaering/goxmldsig (Go)
< 1.1.1
1.1.1

Description

Impact

In versions prior to v0.7.0 it was possible for an attacker to supply an invalid assertion which would trigger a panic due to a nil-pointer dereference.

Patches

The issue was patched in v0.7.0, released on March 2, 2022.

Workarounds

Callers to gosaml2 can use recover() to handle panics to mitigate a potential DoS.

References

See issue #59 for details.

References

@russellhaering russellhaering published to russellhaering/gosaml2 Nov 10, 2022
Published to the GitHub Advisory Database Nov 15, 2022
Reviewed Nov 15, 2022
Last updated Aug 30, 2023

Severity

High
7.5
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Weaknesses

CVE ID

CVE-2020-7731

GHSA ID

GHSA-prjq-f4q3-fvfr

Credits

Checking history
See something to contribute? Suggest improvements for this vulnerability.