Description
The Service Provider (SP) in PicketLink before 2.7.0 does not ensure that it is a member of an Audience element when an AudienceRestriction is specified, which allows remote attackers to log in to other users' accounts via a crafted SAML assertion. NOTE: this identifier has been SPLIT per ADT2 due to different vulnerability types. See CVE-2015-6254 for lack of validation for the Destination attribute in a Response element in a SAML assertion.
Remediation
References
http://rhn.redhat.com/errata/RHSA-2015-0846.html
http://rhn.redhat.com/errata/RHSA-2015-0847.html
http://rhn.redhat.com/errata/RHSA-2015-0848.html
http://rhn.redhat.com/errata/RHSA-2015-0849.html
https://bugzilla.redhat.com/show_bug.cgi?id=1194832
https://issues.jboss.org/browse/PLINK-678
Related Vulnerabilities
CVE-2016-0760 Vulnerability in maven package org.apache.sentry:sentry-binding-hive
CVE-2014-7810 Vulnerability in maven package org.apache.tomcat:el-api
CVE-2015-0277 Vulnerability in maven package org.picketlink:picketlink-federation
CVE-2015-5325 Vulnerability in maven package org.jenkins-ci.main:jenkins-core
CVE-2016-4464 Vulnerability in maven package org.apache.cxf.fediz:plugin