CVE-2023-5455
10.01.2024, 13:15
A Cross-site request forgery vulnerability exists in ipa/session/login_password in all supported versions of IPA. This flaw allows an attacker to trick the user into submitting a request that could perform actions as the user, resulting in a loss of confidentiality and system integrity. During community penetration testing it was found that for certain HTTP end-points FreeIPA does not ensure CSRF protection. Due to implementation details one cannot use this flaw for reflection of a cookie representing already logged-in user. An attacker would always have to go through a new authentication attempt.
Vendor | Product | Version |
---|---|---|
freeipa | freeipa | 𝑥 < 4.6.10 |
freeipa | freeipa | 4.7.0 ≤ 𝑥 < 4.9.14 |
freeipa | freeipa | 4.10.0 ≤ 𝑥 < 4.10.3 |
freeipa | freeipa | 4.11.0 |
freeipa | freeipa | 4.11.0:beta1 |
redhat | codeready_linux_builder | - |
redhat | enterprise_linux | 7.0 |
redhat | enterprise_linux | 8.0 |
redhat | enterprise_linux | 8.0 |
redhat | enterprise_linux | 8.4 |
redhat | enterprise_linux | 9.0 |
redhat | enterprise_linux_desktop | 7.0 |
redhat | enterprise_linux_eus | 8.6 |
redhat | enterprise_linux_eus | 8.6 |
redhat | enterprise_linux_eus | 8.8 |
redhat | enterprise_linux_eus | 9.0 |
redhat | enterprise_linux_eus | 9.2 |
redhat | enterprise_linux_for_arm_64_eus | 8.8 |
redhat | enterprise_linux_for_arm_64_eus | 9.0 |
redhat | enterprise_linux_for_arm_64_eus | 9.2 |
redhat | enterprise_linux_for_ibm_z_systems | 7.0 |
redhat | enterprise_linux_for_ibm_z_systems | 8.0 |
redhat | enterprise_linux_for_ibm_z_systems | 9.0 |
redhat | enterprise_linux_for_ibm_z_systems_eus | 8.6 |
redhat | enterprise_linux_for_ibm_z_systems_eus | 8.8 |
redhat | enterprise_linux_for_ibm_z_systems_eus | 9.0 |
redhat | enterprise_linux_for_ibm_z_systems_eus | 9.2 |
redhat | enterprise_linux_for_power_big_endian | 7.0 |
redhat | enterprise_linux_for_power_little_endian | 7.0 |
redhat | enterprise_linux_for_power_little_endian | 8.0 |
redhat | enterprise_linux_for_power_little_endian | 9.0 |
redhat | enterprise_linux_for_power_little_endian_eus | 8.6 |
redhat | enterprise_linux_for_power_little_endian_eus | 8.8 |
redhat | enterprise_linux_for_power_little_endian_eus | 9.0 |
redhat | enterprise_linux_for_power_little_endian_eus | 9.2 |
redhat | enterprise_linux_for_scientific_computing | 7.0 |
redhat | enterprise_linux_server | 9.0 |
redhat | enterprise_linux_server | 9.2 |
redhat | enterprise_linux_server_aus | 8.2 |
redhat | enterprise_linux_server_aus | 8.4 |
redhat | enterprise_linux_server_aus | 8.6 |
redhat | enterprise_linux_server_aus | 9.2 |
redhat | enterprise_linux_server_for_ibm_z_systems | 9.2 |
redhat | enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions | 8.2 |
redhat | enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions | 8.4 |
redhat | enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions | 8.6 |
redhat | enterprise_linux_server_tus | 8.2 |
redhat | enterprise_linux_server_tus | 8.4 |
redhat | enterprise_linux_server_tus | 8.6 |
redhat | enterprise_linux_server_update_services_for_sap_solutions | 8.2 |
redhat | enterprise_linux_server_update_services_for_sap_solutions | 8.6 |
redhat | enterprise_linux_server_update_services_for_sap_solutions | 9.0 |
redhat | enterprise_linux_server_update_services_for_sap_solutions | 9.2 |
redhat | enterprise_linux_update_services_for_sap_solutions | 9.0 |
redhat | enterprise_linux_update_services_for_sap_solutions | 9.2 |
redhat | enterprise_linux_workstation | 7.0 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Common Weakness Enumeration
References