CVE-2015-5217
Published Nov 17, 2015
Last updated 9 years ago
Overview
- Description
- providers/saml2/admin.py in the Identity Provider (IdP) server in Ipsilon 0.1.0 before 1.0.1 does not properly check permissions to update the SAML2 Service Provider (SP) owner, which allows remote authenticated users to cause a denial of service via a duplicate SP name.
- Source
- secalert@redhat.com
- NVD status
- Analyzed
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4
- Impact score
- 2.9
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- CWE-264
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:ipsilon_project:ipsilon:0.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9318E848-8B25-4164-8EB9-3D4B8DA83E44" }, { "criteria": "cpe:2.3:a:ipsilon_project:ipsilon:0.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8EF2F990-397F-467B-82AF-41F01985D862" }, { "criteria": "cpe:2.3:a:ipsilon_project:ipsilon:0.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5E52E41B-A944-4EB3-BAA3-E0BB23E4CB78" }, { "criteria": "cpe:2.3:a:ipsilon_project:ipsilon:0.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D53E3D1E-01A9-41F5-817E-79483B73FCB1" }, { "criteria": "cpe:2.3:a:ipsilon_project:ipsilon:0.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8FD41C21-E703-4BEC-B508-3A522596A22F" }, { "criteria": "cpe:2.3:a:ipsilon_project:ipsilon:1.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EFB7EFFE-E740-4BB8-80ED-673CB09613BD" } ], "operator": "OR" } ] } ]