{"id":"GO-2020-0047","summary":"Weak hash (SHA-1) in github.com/RobotsAndPencils/go-saml","details":"XML Digital Signatures generated and validated using this package use SHA-1, which may allow an attacker to craft inputs which cause hash collisions depending on their control over the input.","aliases":["CVE-2020-36563","GHSA-5rhg-xhgr-5hfj"],"modified":"2024-05-20T16:03:47Z","published":"2021-04-14T20:04:52Z","database_specific":{"url":"https://pkg.go.dev/vuln/GO-2020-0047","review_status":"REVIEWED"},"references":[{"type":"WEB","url":"https://github.com/RobotsAndPencils/go-saml/pull/38"}],"affected":[{"package":{"name":"github.com/RobotsAndPencils/go-saml","ecosystem":"Go","purl":"pkg:golang/github.com/RobotsAndPencils/go-saml"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"}]}],"ecosystem_specific":{"imports":[{"symbols":["AuthnRequest.Validate","NewAuthnRequest","NewSignedResponse","ServiceProviderSettings.GetAuthnRequest"],"path":"github.com/RobotsAndPencils/go-saml"}]},"database_specific":{"source":"https://vuln.go.dev/ID/GO-2020-0047.json"}}],"schema_version":"1.7.3"}