Description
The Service Provider (SP) in PicketLink before 2.7.0 does not ensure that it is a member of an Audience element when an AudienceRestriction is specified, which allows remote attackers to log in to other users' accounts via a crafted SAML assertion. NOTE: this identifier has been SPLIT per ADT2 due to different vulnerability types. See CVE-2015-6254 for lack of validation for the Destination attribute in a Response element in a SAML assertion.
Remediation
References
http://rhn.redhat.com/errata/RHSA-2015-0848.html
http://rhn.redhat.com/errata/RHSA-2015-0847.html
https://bugzilla.redhat.com/show_bug.cgi?id=1194832
http://rhn.redhat.com/errata/RHSA-2015-0849.html
https://issues.jboss.org/browse/PLINK-678
http://rhn.redhat.com/errata/RHSA-2015-0846.html
Related Vulnerabilities
CVE-2023-35167 Vulnerability in npm package remult
CVE-2014-3120 Vulnerability in maven package org.elasticsearch:elasticsearch
CVE-2023-28443 Vulnerability in npm package directus
CVE-2016-5393 Vulnerability in maven package org.apache.hadoop:hadoop-common
CVE-2023-29513 Vulnerability in maven package org.xwiki.platform:xwiki-platform-web-templates