Cryptographic Issues Affecting org.picketlink:picketlink-tomcat-common package, versions [,2.7.0)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.7% (81st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JAVA-ORGPICKETLINK-31314
  • published18 Aug 2015
  • disclosed17 Aug 2015
  • creditUnknown

Introduced: 17 Aug 2015

CVE-2015-6254  (opens in a new tab)
CWE-17  (opens in a new tab)

Overview

org.picketlink:picketlink-tomcat-common The (1) Service Provider (SP) and (2) Identity Provider (IdP) in PicketLink before 2.7.0 does not ensure that the Destination attribute in a Response element in a SAML assertion matches the location from which the message was received, which allows remote attackers to have unspecified impact via unknown vectors. NOTE: this identifier was SPLIT from CVE-2015-0277 per ADT2 due to different vulnerability types.

References

CVSS Scores

version 3.1