Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-28119
HistoryMar 22, 2023 - 12:00 a.m.

CVE-2023-28119

2023-03-2200:00:00
ubuntu.com
ubuntu.com
9
vulnerability
crewjam/saml
saml
golang
http request
flate.newreader
deflate algorithm
process crash

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

47.5%

The crewjam/saml go library contains a partial implementation of the SAML
standard in golang. Prior to version 0.4.13, the package’s use of
flate.NewReader does not limit the size of the input. The user can pass
more than 1 MB of data in the HTTP request to the processing functions,
which will be decompressed server-side using the Deflate algorithm.
Therefore, after repeating the same request multiple times, it is possible
to achieve a reliable crash since the operating system kills the process.
This issue is patched in version 0.4.13.

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

47.5%