Vulnerability Description
The Identity Provider (IdP) server in Ipsilon 0.1.0 before 1.0.1 does not properly escape certain characters in a Python exception-message template, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via an HTTP response.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ipsilon-Project | Ipsilon | >= 0.1.0, < 1.0.1 |
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2015/10/27/8Mailing ListThird Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=1255170Issue TrackingThird Party Advisory
- https://pagure.io/ipsilon/a503aa9c2a30a74e709d1c88099befd50fb2eb16PatchThird Party Advisory
- http://www.openwall.com/lists/oss-security/2015/10/27/8Mailing ListThird Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=1255170Issue TrackingThird Party Advisory
- https://pagure.io/ipsilon/a503aa9c2a30a74e709d1c88099befd50fb2eb16PatchThird Party Advisory
FAQ
What is CVE-2015-5216?
CVE-2015-5216 is a vulnerability with a CVSS score of 6.1 (MEDIUM). The Identity Provider (IdP) server in Ipsilon 0.1.0 before 1.0.1 does not properly escape certain characters in a Python exception-message template, which makes it easier for remote attackers to condu...
How severe is CVE-2015-5216?
CVE-2015-5216 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-5216?
Check the references section above for vendor advisories and patch information. Affected products include: Ipsilon-Project Ipsilon.