CVE-2015-5217: Ipsilon denial of service via a duplicate SP name
(updated )
providers/saml2/admin.py in the Identity Provider (IdP) server in Ipsilon 0.1.0 before 1.0.1 does not properly check permissions to update the SAML2 Service Provider (SP) owner, which allows remote authenticated users to cause a denial of service via a duplicate SP name.
References
- bugzilla.redhat.com/show_bug.cgi?id=1255172
- fedorahosted.org/ipsilon/wiki/Releases/v1.0.1
- github.com/advisories/GHSA-6875-ff47-r6p6
- github.com/ipsilon-project/ipsilon
- github.com/pypa/advisory-database/tree/main/vulns/ipsilon/PYSEC-2015-41.yaml
- nvd.nist.gov/vuln/detail/CVE-2015-5217
- pagure.io/ipsilon/826e6339441546f596320f3d73304ab5f7c10de6
Detect and mitigate CVE-2015-5217 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →