Get started for free to scan for vulnerabilites.
Download Mageni to scan for vulnerabilities. It is free to get started and can be installed in Windows, macOS and Linux.
The Service Provider (SP) in PicketLink before 2.7.0 does not ensure that it is a member of an Audience element when an AudienceRestriction is specified, which allows remote attackers to log in to other users' accounts via a crafted SAML assertion. NOTE: this identifier has been SPLIT per ADT2 due to different vulnerability types. See CVE-2015-6254 for lack of validation for the Destination attribute in a Response element in a SAML assertion..
- Base Score
- Exploit Score
- Access Vector
- Access Complexity
- Authentication Required
- Impact Score
- Confidentiality Impact
- Availability Impact
- Integrity Impact
Know your vulnerabilities for free. Start using Mageni today.
Mageni can help you to find, assess and manage your vulnerabilities.Get Started for Free