Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6875-ff47-r6p6

Опубликовано: 17 мая 2022
Источник: github
Github: Прошло ревью

Описание

Ipsilon denial of service via a duplicate SP name

providers/saml2/admin.py in the Identity Provider (IdP) server in Ipsilon 0.1.0 before 1.0.1 does not properly check permissions to update the SAML2 Service Provider (SP) owner, which allows remote authenticated users to cause a denial of service via a duplicate SP name.

Пакеты

Наименование

ipsilon

pip
Затронутые версииВерсия исправления

>= 0.1.0, < 1.0.1

1.2.0

EPSS

Процентиль: 59%
0.00388
Низкий

Связанные уязвимости

redhat
больше 10 лет назад

providers/saml2/admin.py in the Identity Provider (IdP) server in Ipsilon 0.1.0 before 1.0.1 does not properly check permissions to update the SAML2 Service Provider (SP) owner, which allows remote authenticated users to cause a denial of service via a duplicate SP name.

nvd
около 10 лет назад

providers/saml2/admin.py in the Identity Provider (IdP) server in Ipsilon 0.1.0 before 1.0.1 does not properly check permissions to update the SAML2 Service Provider (SP) owner, which allows remote authenticated users to cause a denial of service via a duplicate SP name.

debian
около 10 лет назад

providers/saml2/admin.py in the Identity Provider (IdP) server in Ipsi ...

EPSS

Процентиль: 59%
0.00388
Низкий