Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-5301

Опубликовано: 14 окт. 2015
Источник: redhat
CVSS2: 5.5
EPSS Низкий

Описание

providers/saml2/admin.py in the Identity Provider (IdP) server in Ipsilon 0.1.0 before 1.0.2 and 1.1.x before 1.1.1 does not properly check permissions, which allows remote authenticated users to cause a denial of service by deleting a SAML2 Service Provider (SP).

It was found that Ipsilon did not check whether a user is authorized to delete a service provider. An authenticated user could use this flaw to delete any service provider, potentially resulting in a denial of service.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7ipsilonAffected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-862
https://bugzilla.redhat.com/show_bug.cgi?id=1271530ipsilon: missing user authorization check when deleting a service provider

EPSS

Процентиль: 71%
0.00659
Низкий

5.5 Medium

CVSS2

Связанные уязвимости

nvd
около 10 лет назад

providers/saml2/admin.py in the Identity Provider (IdP) server in Ipsilon 0.1.0 before 1.0.2 and 1.1.x before 1.1.1 does not properly check permissions, which allows remote authenticated users to cause a denial of service by deleting a SAML2 Service Provider (SP).

debian
около 10 лет назад

providers/saml2/admin.py in the Identity Provider (IdP) server in Ipsi ...

github
больше 3 лет назад

Ipsilon denial of service by deleting a SAML2 Service Provider (SP)

EPSS

Процентиль: 71%
0.00659
Низкий

5.5 Medium

CVSS2