Description
The Service Provider (SP) in PicketLink before 2.7.0 does not ensure that it is a member of an Audience element when an AudienceRestriction is specified, which allows remote attackers to log in to other users' accounts via a crafted SAML assertion. NOTE: this identifier has been SPLIT per ADT2 due to different vulnerability types. See CVE-2015-6254 for lack of validation for the Destination attribute in a Response element in a SAML assertion.
Remediation
References
http://rhn.redhat.com/errata/RHSA-2015-0848.html
http://rhn.redhat.com/errata/RHSA-2015-0847.html
https://bugzilla.redhat.com/show_bug.cgi?id=1194832
http://rhn.redhat.com/errata/RHSA-2015-0849.html
https://issues.jboss.org/browse/PLINK-678
http://rhn.redhat.com/errata/RHSA-2015-0846.html
Related Vulnerabilities
CVE-2016-4800 Vulnerability in maven package org.eclipse.jetty:jetty-util
CVE-2023-3431 Vulnerability in maven package net.sourceforge.plantuml:plantuml
CVE-2016-4437 Vulnerability in maven package org.apache.shiro:shiro-core
CVE-2014-7193 Vulnerability in npm package crumb
CVE-2015-0277 Vulnerability in maven package org.picketlink:picketlink-jbas7-single