CVE-2015-5301
Published Nov 17, 2015
Last updated 8 years ago
Overview
- Description
- providers/saml2/admin.py in the Identity Provider (IdP) server in Ipsilon 0.1.0 before 1.0.2 and 1.1.x before 1.1.1 does not properly check permissions, which allows remote authenticated users to cause a denial of service by deleting a SAML2 Service Provider (SP).
- Source
- secalert@redhat.com
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5.5
- Impact score
- 4.9
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:N/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-264
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:ipsilon_project:ipsilon:0.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9318E848-8B25-4164-8EB9-3D4B8DA83E44" }, { "criteria": "cpe:2.3:a:ipsilon_project:ipsilon:0.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8EF2F990-397F-467B-82AF-41F01985D862" }, { "criteria": "cpe:2.3:a:ipsilon_project:ipsilon:0.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5E52E41B-A944-4EB3-BAA3-E0BB23E4CB78" }, { "criteria": "cpe:2.3:a:ipsilon_project:ipsilon:0.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D53E3D1E-01A9-41F5-817E-79483B73FCB1" }, { "criteria": "cpe:2.3:a:ipsilon_project:ipsilon:0.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8FD41C21-E703-4BEC-B508-3A522596A22F" }, { "criteria": "cpe:2.3:a:ipsilon_project:ipsilon:1.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EFB7EFFE-E740-4BB8-80ED-673CB09613BD" }, { "criteria": "cpe:2.3:a:ipsilon_project:ipsilon:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A5B73BD1-6E0B-4BD3-9F86-84F8BAC2B7A3" }, { "criteria": "cpe:2.3:a:ipsilon_project:ipsilon:1.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E4313C8A-E084-49F1-A5D7-952E2A99F2AC" } ], "operator": "OR" } ] } ]