Description
The Service Provider (SP) in PicketLink before 2.7.0 does not ensure that it is a member of an Audience element when an AudienceRestriction is specified, which allows remote attackers to log in to other users' accounts via a crafted SAML assertion. NOTE: this identifier has been SPLIT per ADT2 due to different vulnerability types. See CVE-2015-6254 for lack of validation for the Destination attribute in a Response element in a SAML assertion.
Remediation
References
http://rhn.redhat.com/errata/RHSA-2015-0848.html
http://rhn.redhat.com/errata/RHSA-2015-0847.html
https://bugzilla.redhat.com/show_bug.cgi?id=1194832
http://rhn.redhat.com/errata/RHSA-2015-0849.html
https://issues.jboss.org/browse/PLINK-678
http://rhn.redhat.com/errata/RHSA-2015-0846.html
Related Vulnerabilities
CVE-2022-41654 Vulnerability in npm package ghost
CVE-2014-7810 Vulnerability in maven package org.apache.tomcat:tomcat-el-api
CVE-2016-6802 Vulnerability in maven package org.apache.shiro:shiro-web
CVE-2015-1836 Vulnerability in maven package org.apache.hbase:hbase-client
CVE-2016-4464 Vulnerability in maven package org.apache.cxf.fediz:fediz-core