Description
A Cross-site request forgery vulnerability exists in ipa/session/login_password in all supported versions of IPA. This flaw allows an attacker to trick the user into submitting a request that could perform actions as the user, resulting in a loss of confidentiality and system integrity. During community penetration testing it was found that for certain HTTP end-points FreeIPA does not ensure CSRF protection. Due to implementation details one cannot use this flaw for reflection of a cookie representing already logged-in user. An attacker would always have to go through a new authentication attempt.
Published: 2024-01-10
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Workaround

Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-57769 A Cross-site request forgery vulnerability exists in ipa/session/login_password in all supported versions of IPA. This flaw allows an attacker to trick the user into submitting a request that could perform actions as the user, resulting in a loss of confidentiality and system integrity. During community penetration testing it was found that for certain HTTP end-points FreeIPA does not ensure CSRF protection. Due to implementation details one cannot use this flaw for reflection of a cookie representing already logged-in user. An attacker would always have to go through a new authentication attempt.
History

Wed, 18 Mar 2026 03:30:00 +0000

Type Values Removed Values Added
CPEs cpe:/o:redhat:rhel_eus:8.6::baseos

Fri, 22 Nov 2024 12:00:00 +0000


Thu, 14 Nov 2024 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Sep 2024 16:30:00 +0000


Subscriptions

Fedoraproject Fedora
Freeipa Freeipa
Redhat Codeready Linux Builder Enterprise Linux Enterprise Linux Desktop Enterprise Linux Eus Enterprise Linux For Arm 64 Eus Enterprise Linux For Ibm Z Systems Enterprise Linux For Ibm Z Systems Eus Enterprise Linux For Power Big Endian Enterprise Linux For Power Little Endian Enterprise Linux For Power Little Endian Eus Enterprise Linux For Scientific Computing Enterprise Linux Server Enterprise Linux Server Aus Enterprise Linux Server For Ibm Z Systems Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions Enterprise Linux Server Tus Enterprise Linux Server Update Services For Sap Solutions Enterprise Linux Update Services For Sap Solutions Enterprise Linux Workstation Rhel Aus Rhel E4s Rhel Eus Rhel Tus
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-03-18T02:31:15.798Z

Reserved: 2023-10-09T04:39:08.777Z

Link: CVE-2023-5455

cve-icon Vulnrichment

Updated: 2024-08-02T07:59:44.726Z

cve-icon NVD

Status : Modified

Published: 2024-01-10T13:15:48.643

Modified: 2026-03-18T04:16:51.150

Link: CVE-2023-5455

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-01-10T06:30:00Z

Links: CVE-2023-5455 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses