CVE-2023-5455

A Cross-site request forgery vulnerability exists in ipa/session/login_password in all supported versions of IPA. This flaw allows an attacker to trick the user into submitting a request that could perform actions as the user, resulting in a loss of confidentiality and system integrity. During community penetration testing it was found that for certain HTTP end-points FreeIPA does not ensure CSRF protection. Due to implementation details one cannot use this flaw for reflection of a cookie representing already logged-in user. An attacker would always have to go through a new authentication attempt.
CSRF
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.5 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
redhatCNA
6.5 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
CVEADP
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 53%
VendorProductVersion
freeipafreeipa
𝑥
< 4.6.10
freeipafreeipa
4.7.0 ≤
𝑥
< 4.9.14
freeipafreeipa
4.10.0 ≤
𝑥
< 4.10.3
freeipafreeipa
4.11.0
freeipafreeipa
4.11.0:beta1
redhatcodeready_linux_builder
-
redhatenterprise_linux
7.0
redhatenterprise_linux
8.0
redhatenterprise_linux
8.0
redhatenterprise_linux
8.4
redhatenterprise_linux
9.0
redhatenterprise_linux_desktop
7.0
redhatenterprise_linux_eus
8.6
redhatenterprise_linux_eus
8.6
redhatenterprise_linux_eus
8.8
redhatenterprise_linux_eus
9.0
redhatenterprise_linux_eus
9.2
redhatenterprise_linux_for_arm_64_eus
8.8
redhatenterprise_linux_for_arm_64_eus
9.0
redhatenterprise_linux_for_arm_64_eus
9.2
redhatenterprise_linux_for_ibm_z_systems
7.0
redhatenterprise_linux_for_ibm_z_systems
8.0
redhatenterprise_linux_for_ibm_z_systems
9.0
redhatenterprise_linux_for_ibm_z_systems_eus
8.6
redhatenterprise_linux_for_ibm_z_systems_eus
8.8
redhatenterprise_linux_for_ibm_z_systems_eus
9.0
redhatenterprise_linux_for_ibm_z_systems_eus
9.2
redhatenterprise_linux_for_power_big_endian
7.0
redhatenterprise_linux_for_power_little_endian
7.0
redhatenterprise_linux_for_power_little_endian
8.0
redhatenterprise_linux_for_power_little_endian
9.0
redhatenterprise_linux_for_power_little_endian_eus
8.6
redhatenterprise_linux_for_power_little_endian_eus
8.8
redhatenterprise_linux_for_power_little_endian_eus
9.0
redhatenterprise_linux_for_power_little_endian_eus
9.2
redhatenterprise_linux_for_scientific_computing
7.0
redhatenterprise_linux_server
9.0
redhatenterprise_linux_server
9.2
redhatenterprise_linux_server_aus
8.2
redhatenterprise_linux_server_aus
8.4
redhatenterprise_linux_server_aus
8.6
redhatenterprise_linux_server_aus
9.2
redhatenterprise_linux_server_for_ibm_z_systems
9.2
redhatenterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions
8.2
redhatenterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions
8.4
redhatenterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions
8.6
redhatenterprise_linux_server_tus
8.2
redhatenterprise_linux_server_tus
8.4
redhatenterprise_linux_server_tus
8.6
redhatenterprise_linux_server_update_services_for_sap_solutions
8.2
redhatenterprise_linux_server_update_services_for_sap_solutions
8.6
redhatenterprise_linux_server_update_services_for_sap_solutions
9.0
redhatenterprise_linux_server_update_services_for_sap_solutions
9.2
redhatenterprise_linux_update_services_for_sap_solutions
9.0
redhatenterprise_linux_update_services_for_sap_solutions
9.2
redhatenterprise_linux_workstation
7.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
freeipa
bookworm
unimportant
sid
4.12.2-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
freeipa
oracular
needs-triage
noble
needs-triage
mantic
ignored
lunar
ignored
jammy
needs-triage
focal
needs-triage
bionic
needs-triage
xenial
needs-triage
trusty
ignored
References