An attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing.
References:GSA_kwCzR0hTQS02djJwLXA1NDMtcGhyOc4ABKRz
golang.org/x/oauth2 Improper Validation of Syntactic Correctness of Input vulnerability
Affected Packages | Affected Versions | Fixed Versions | |
---|---|---|---|
go:golang.org/x/oauth2 | < 0.27.0 | 0.27.0 | |
Affected Version RangesAll affected versions0.1.0, 0.2.0, 0.3.0, 0.4.0, 0.5.0, 0.6.0, 0.7.0, 0.8.0, 0.9.0, 0.10.0, 0.11.0, 0.12.0, 0.13.0, 0.14.0, 0.15.0, 0.16.0, 0.17.0, 0.18.0, 0.19.0, 0.20.0, 0.21.0, 0.22.0, 0.23.0, 0.24.0, 0.25.0, 0.26.0 All unaffected versions0.27.0, 0.28.0, 0.29.0, 0.30.0 |