Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. ipsilon
  4. ›
  5. CVE-2015-5217

CVE-2015-5217: Ipsilon denial of service via a duplicate SP name

May 17, 2022 (updated November 22, 2024)

providers/saml2/admin.py in the Identity Provider (IdP) server in Ipsilon 0.1.0 before 1.0.1 does not properly check permissions to update the SAML2 Service Provider (SP) owner, which allows remote authenticated users to cause a denial of service via a duplicate SP name.

References

  • bugzilla.redhat.com/show_bug.cgi?id=1255172
  • fedorahosted.org/ipsilon/wiki/Releases/v1.0.1
  • github.com/advisories/GHSA-6875-ff47-r6p6
  • github.com/ipsilon-project/ipsilon
  • github.com/pypa/advisory-database/tree/main/vulns/ipsilon/PYSEC-2015-41.yaml
  • nvd.nist.gov/vuln/detail/CVE-2015-5217
  • pagure.io/ipsilon/826e6339441546f596320f3d73304ab5f7c10de6

Code Behaviors & Features

Detect and mitigate CVE-2015-5217 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 0.1.0 before 1.2.0

Fixed versions

  • 1.2.0

Solution

Upgrade to version 1.2.0 or above.

Impact 4 MEDIUM

AV:N/AC:L/Au:S/C:N/I:N/A:P

Learn more about CVSS

Source file

pypi/ipsilon/CVE-2015-5217.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:44 +0000.