Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-6254

Опубликовано: 14 апр. 2015
Источник: redhat
CVSS3: 6.3
EPSS Низкий

Описание

The (1) Service Provider (SP) and (2) Identity Provider (IdP) in PicketLink before 2.7.0 does not ensure that the Destination attribute in a Response element in a SAML assertion matches the location from which the message was received, which allows remote attackers to have unspecified impact via unknown vectors. NOTE: this identifier was SPLIT from CVE-2015-0277 per ADT2 due to different vulnerability types.

A flaw was found in the way PicketLink's Service Provider (SP) and Identity Provider (IdP) handled certain requests. The SP and IdP in PicketLink before 2.7.0 does not ensure that the Destination attribute in a Response element in the SAML assertion matches the location from which the message was received. This flaw allows a remote attacker to log into a victim's account via PicketLink.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat JBoss Enterprise Application Platform 6picketlinkNot affected
Red Hat JBoss Enterprise Application Platform 6.4FixedRHSA-2015:084916.04.2015
Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5apache-commons-cli-eap6FixedRHSA-2015:084616.04.2015
Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5apache-commons-codec-eap6FixedRHSA-2015:084616.04.2015
Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5apache-commons-configuration-eap6FixedRHSA-2015:084616.04.2015
Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5apache-commons-daemon-eap6FixedRHSA-2015:084616.04.2015
Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5apache-commons-io-eap6FixedRHSA-2015:084616.04.2015
Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5apache-commons-lang-eap6FixedRHSA-2015:084616.04.2015
Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5apache-commons-pool-eap6FixedRHSA-2015:084616.04.2015
Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5apache-mime4jFixedRHSA-2015:084616.04.2015

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-345
https://bugzilla.redhat.com/show_bug.cgi?id=1974359PicketLink: Lack of validation for the Destination attribute in a Response element in a SAML assertion

EPSS

Процентиль: 71%
0.00697
Низкий

6.3 Medium

CVSS3

Связанные уязвимости

nvd
больше 10 лет назад

The (1) Service Provider (SP) and (2) Identity Provider (IdP) in PicketLink before 2.7.0 does not ensure that the Destination attribute in a Response element in a SAML assertion matches the location from which the message was received, which allows remote attackers to have unspecified impact via unknown vectors. NOTE: this identifier was SPLIT from CVE-2015-0277 per ADT2 due to different vulnerability types.

github
больше 3 лет назад

The (1) Service Provider (SP) and (2) Identity Provider (IdP) in PicketLink before 2.7.0 does not ensure that the Destination attribute in a Response element in a SAML assertion matches the location from which the message was received, which allows remote attackers to have unspecified impact via unknown vectors. NOTE: this identifier was SPLIT from CVE-2015-0277 per ADT2 due to different vulnerability types.

EPSS

Процентиль: 71%
0.00697
Низкий

6.3 Medium

CVSS3

Уязвимость CVE-2015-6254