Improper Authentication Affecting ipsilon-authldap package, versions <0:1.0.0-13.el7_3


Severity

Recommended
0.0
high
0
10

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
0.85% (82nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Authentication vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RHEL7-IPSILONAUTHLDAP-5160371
  • published26 Jul 2021
  • disclosed21 Nov 2016

Introduced: 21 Nov 2016

CVE-2016-8638  (opens in a new tab)
CWE-287  (opens in a new tab)

How to fix?

Upgrade RHEL:7 ipsilon-authldap to version 0:1.0.0-13.el7_3 or higher.
This issue was patched in RHSA-2016:2809.

NVD Description

Note: Versions mentioned in the description apply only to the upstream ipsilon-authldap package and not the ipsilon-authldap package as distributed by RHEL. See How to fix? for RHEL:7 relevant fixed versions and status.

A vulnerability in ipsilon 2.0 before 2.0.2, 1.2 before 1.2.1, 1.1 before 1.1.2, and 1.0 before 1.0.3 was found that allows attacker to log out active sessions of other users. This issue is related to how it tracks sessions, and allows an unauthenticated attacker to view and terminate active sessions from other users. It is also called a "SAML2 multi-session vulnerability."