Vulnerability CVE-2015-5301


Published: 2015-11-17

Description:
providers/saml2/admin.py in the Identity Provider (IdP) server in Ipsilon 0.1.0 before 1.0.2 and 1.1.x before 1.1.1 does not properly check permissions, which allows remote authenticated users to cause a denial of service by deleting a SAML2 Service Provider (SP).

CVSS2 => (AV:N/AC:L/Au:S/C:N/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5.5/10
4.9/10
8/10
Exploit range
Attack complexity
Authentication
Remote
Low
Single time
Confidentiality impact
Integrity impact
Availability impact
None
Partial
Partial
Affected software
Ipsilon project -> Ipsilon 

 References:
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171052.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171067.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171076.html
http://www.openwall.com/lists/oss-security/2015/10/27/8
https://bugzilla.redhat.com/show_bug.cgi?id=1271530
https://fedorahosted.org/ipsilon/wiki/Releases/v1.0.2
https://fedorahosted.org/ipsilon/wiki/Releases/v1.1.1
https://pagure.io/ipsilon/9dec97c3c83928d231ea10f4160523a13803e594

Copyright 2024, cxsecurity.com

 

Back to Top