A Cross-site request forgery vulnerability exists in ipa/session/login_password in all supported versions of IPA. This flaw allows an attacker to trick the user into submitting a request that could perform actions as the user, resulting in a loss of confidentiality and system integrity. During community penetration testing it was found that for certain HTTP end-points FreeIPA does not ensure CSRF protection. Due to implementation details one cannot use this flaw for reflection of a cookie representing already logged-in user. An attacker would always have to go through a new authentication attempt.
Metrics
Affected Vendors & Products
References
History
Fri, 22 Nov 2024 12:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Thu, 14 Nov 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 16 Sep 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
MITRE
Status: PUBLISHED
Assigner: redhat
Published: 2024-01-10T12:33:00.336Z
Updated: 2024-11-23T03:29:04.471Z
Reserved: 2023-10-09T04:39:08.777Z
Link: CVE-2023-5455
Vulnrichment
Updated: 2024-08-02T07:59:44.726Z
NVD
Status : Modified
Published: 2024-01-10T13:15:48.643
Modified: 2024-11-21T08:41:47.993
Link: CVE-2023-5455
Redhat