Description
The Service Provider (SP) in PicketLink before 2.7.0 does not ensure that it is a member of an Audience element when an AudienceRestriction is specified, which allows remote attackers to log in to other users' accounts via a crafted SAML assertion. NOTE: this identifier has been SPLIT per ADT2 due to different vulnerability types. See CVE-2015-6254 for lack of validation for the Destination attribute in a Response element in a SAML assertion.
Published: 2015-08-17
Score: 6.0 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2015-0290 The Service Provider (SP) in PicketLink before 2.7.0 does not ensure that it is a member of an Audience element when an AudienceRestriction is specified, which allows remote attackers to log in to other users' accounts via a crafted SAML assertion. NOTE: this identifier has been SPLIT per ADT2 due to different vulnerability types. See CVE-2015-6254 for lack of validation for the Destination attribute in a Response element in a SAML assertion.
History

No history.

Subscriptions

Picketlink Picketlink
Redhat Jboss Enterprise Application Platform
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-06T04:03:10.883Z

Reserved: 2014-11-18T00:00:00.000Z

Link: CVE-2015-0277

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2015-08-17T20:59:00.107

Modified: 2026-05-06T22:30:45.220

Link: CVE-2015-0277

cve-icon Redhat

Severity : Important

Publid Date: 2015-04-14T00:00:00Z

Links: CVE-2015-0277 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses