providers/saml2/admin.py in the Identity Provider (IdP) server in Ipsilon 0.1.0 before 1.0.1 does not properly check permissions to update the SAML2 Service Provider (SP) owner, which allows remote authenticated users to cause a denial of service via a duplicate SP name.
Advisories
Source ID Title
EUVD EUVD EUVD-2015-0037 providers/saml2/admin.py in the Identity Provider (IdP) server in Ipsilon 0.1.0 before 1.0.1 does not properly check permissions to update the SAML2 Service Provider (SP) owner, which allows remote authenticated users to cause a denial of service via a duplicate SP name.
Github GHSA Github GHSA GHSA-6875-ff47-r6p6 Ipsilon denial of service via a duplicate SP name
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-06T06:41:08.421Z

Reserved: 2015-07-01T00:00:00

Link: CVE-2015-5217

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2015-11-17T15:59:01.513

Modified: 2025-04-12T10:46:40.837

Link: CVE-2015-5217

cve-icon Redhat

Severity : Moderate

Publid Date: 2015-08-19T00:00:00Z

Links: CVE-2015-5217 - Bugzilla

cve-icon OpenCVE Enrichment

No data.