Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS05cXA0LTc5cTgtNThwcs4AAcpo
Ipsilon denial of service by deleting a SAML2 Service Provider (SP)
providers/saml2/admin.py in the Identity Provider (IdP) server in Ipsilon 0.1.0 before 1.0.2 and 1.1.x before 1.1.1 does not properly check permissions, which allows remote authenticated users to cause a denial of service by deleting a SAML2 Service Provider (SP).
Permalink: https://github.com/advisories/GHSA-9qp4-79q8-58prJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS05cXA0LTc5cTgtNThwcs4AAcpo
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 2 years ago
Updated: about 22 hours ago
Identifiers: GHSA-9qp4-79q8-58pr, CVE-2015-5301
References:
- https://nvd.nist.gov/vuln/detail/CVE-2015-5301
- https://bugzilla.redhat.com/show_bug.cgi?id=1271530
- https://fedorahosted.org/ipsilon/wiki/Releases/v1.0.2
- https://fedorahosted.org/ipsilon/wiki/Releases/v1.1.1
- https://pagure.io/ipsilon/9dec97c3c83928d231ea10f4160523a13803e594
- http://www.openwall.com/lists/oss-security/2015/10/27/8
- https://github.com/pypa/advisory-database/tree/main/vulns/ipsilon/PYSEC-2015-42.yaml
- https://github.com/advisories/GHSA-9qp4-79q8-58pr
Affected Packages
pypi:ipsilon
Dependent packages: 0Dependent repositories: 1
Downloads: 257 last month
Affected Version Ranges: >= 1.1.0, < 1.1.1, >= 0.1.0, < 1.0.2
Fixed in: 1.2.0, 1.0.2
All affected versions:
All unaffected versions: 1.2.0, 3.0.0, 3.0.1, 3.0.2, 3.0.3, 3.0.4