Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS02ODc1LWZmNDctcjZwNs4AAdgp
Ipsilon denial of service via a duplicate SP name
providers/saml2/admin.py in the Identity Provider (IdP) server in Ipsilon 0.1.0 before 1.0.1 does not properly check permissions to update the SAML2 Service Provider (SP) owner, which allows remote authenticated users to cause a denial of service via a duplicate SP name.
Permalink: https://github.com/advisories/GHSA-6875-ff47-r6p6JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS02ODc1LWZmNDctcjZwNs4AAdgp
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 2 years ago
Updated: 5 days ago
Identifiers: GHSA-6875-ff47-r6p6, CVE-2015-5217
References:
- https://nvd.nist.gov/vuln/detail/CVE-2015-5217
- https://bugzilla.redhat.com/show_bug.cgi?id=1255172
- https://fedorahosted.org/ipsilon/wiki/Releases/v1.0.1
- https://pagure.io/ipsilon/826e6339441546f596320f3d73304ab5f7c10de6
- http://www.openwall.com/lists/oss-security/2015/10/27/8
- https://github.com/pypa/advisory-database/tree/main/vulns/ipsilon/PYSEC-2015-41.yaml
- https://github.com/advisories/GHSA-6875-ff47-r6p6
Affected Packages
pypi:ipsilon
Dependent packages: 0Dependent repositories: 1
Downloads: 257 last month
Affected Version Ranges: >= 0.1.0, < 1.0.1
Fixed in: 1.2.0
All affected versions:
All unaffected versions: 1.2.0, 3.0.0, 3.0.1, 3.0.2, 3.0.3, 3.0.4