GHSA-6875-ff47-r6p6

Suggest an improvement
Source
https://github.com/advisories/GHSA-6875-ff47-r6p6
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-6875-ff47-r6p6/GHSA-6875-ff47-r6p6.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-6875-ff47-r6p6
Aliases
  • CVE-2015-5217
Published
2022-05-17T04:01:58Z
Modified
2024-11-22T20:42:25.888568Z
Summary
Ipsilon denial of service via a duplicate SP name
Details

providers/saml2/admin.py in the Identity Provider (IdP) server in Ipsilon 0.1.0 before 1.0.1 does not properly check permissions to update the SAML2 Service Provider (SP) owner, which allows remote authenticated users to cause a denial of service via a duplicate SP name.

Database specific
{
    "nvd_published_at": "2015-11-17T15:59:00Z",
    "cwe_ids": [],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2024-11-22T20:20:12Z"
}
References

Affected packages

PyPI / ipsilon

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0.1.0
Fixed
1.2.0

Database specific

{
    "last_known_affected_version_range": "< 1.0.1"
}