org.picketlink:picketlink-federation@2.5.3.SP4 vulnerabilities

  • latest version

    2.5.5.SP12

  • latest non vulnerable version

  • first published

    11 years ago

  • latest version published

    6 years ago

  • licenses detected

    • [2.5.0.Beta5,2.5.5.SP8); [2.6.0.Beta2,)
  • package manager

  • Direct Vulnerabilities

    Known vulnerabilities in the org.picketlink:picketlink-federation package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • L
    Authentication Bypass

    org.picketlink:picketlink-federation The org.jboss.security.plugins.mapping.JBossMappingManager implementation in JBoss Security in Red Hat JBoss Enterprise Application Platform (EAP) before 6.3.3 uses the default security domain when a security domain is undefined, which allows remote authenticated users to bypass intended access restrictions by leveraging credentials on the default domain for a role that is also on the application domain.

    [2,2.5.3.SP13][2.6,2.6.1][2.7-alpha,2.7.1.Beta2]
    • M
    Cryptographic Issues

    org.picketlink:picketlink-federation The (1) Service Provider (SP) and (2) Identity Provider (IdP) in PicketLink before 2.7.0 does not ensure that the Destination attribute in a Response element in a SAML assertion matches the location from which the message was received, which allows remote attackers to have unspecified impact via unknown vectors. NOTE: this identifier was SPLIT from CVE-2015-0277 per ADT2 due to different vulnerability types.

    [,2.7.0)
    • M
    Improper Access Control

    org.picketlink:picketlink-federation The Service Provider (SP) in PicketLink before 2.7.0 does not ensure that it is a member of an Audience element when an AudienceRestriction is specified, which allows remote attackers to log in to other users' accounts via a crafted SAML assertion. NOTE: this identifier has been SPLIT per ADT2 due to different vulnerability types. See CVE-2015-6254 for lack of validation for the Destination attribute in a Response element in a SAML assertion.

    [,2.7.0)