Описание
Ipsilon denial of service via a duplicate SP name
providers/saml2/admin.py in the Identity Provider (IdP) server in Ipsilon 0.1.0 before 1.0.1 does not properly check permissions to update the SAML2 Service Provider (SP) owner, which allows remote authenticated users to cause a denial of service via a duplicate SP name.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2015-5217
- https://bugzilla.redhat.com/show_bug.cgi?id=1255172
- https://fedorahosted.org/ipsilon/wiki/Releases/v1.0.1
- https://github.com/pypa/advisory-database/tree/main/vulns/ipsilon/PYSEC-2015-41.yaml
- https://pagure.io/ipsilon/826e6339441546f596320f3d73304ab5f7c10de6
- http://www.openwall.com/lists/oss-security/2015/10/27/8
Пакеты
ipsilon
>= 0.1.0, < 1.0.1
1.2.0
EPSS
CVE ID
Связанные уязвимости
providers/saml2/admin.py in the Identity Provider (IdP) server in Ipsilon 0.1.0 before 1.0.1 does not properly check permissions to update the SAML2 Service Provider (SP) owner, which allows remote authenticated users to cause a denial of service via a duplicate SP name.
providers/saml2/admin.py in the Identity Provider (IdP) server in Ipsilon 0.1.0 before 1.0.1 does not properly check permissions to update the SAML2 Service Provider (SP) owner, which allows remote authenticated users to cause a denial of service via a duplicate SP name.
providers/saml2/admin.py in the Identity Provider (IdP) server in Ipsi ...
EPSS