A flaw was found in the FreeIPA API audit, where it sends the whole FreeIPA command line to journalctl. As a consequence, during the FreeIPA installation process, it inadvertently leaks the administrative user credentials, including the administrator password, to the journal database. In the worst-case scenario, where the journal log is centralized, users with access to it can have improper access to the FreeIPA administrator credentials.
Metrics
Affected Vendors & Products
References
History
Wed, 15 Jan 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 15 Jan 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:enterprise_linux:9::appstream cpe:/a:redhat:enterprise_linux:9::crb |
|
References |
|
Wed, 15 Jan 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A flaw was found in the FreeIPA API audit, where it sends the whole FreeIPA command line to journalctl. As a consequence, during the FreeIPA installation process, it inadvertently leaks the administrative user credentials, including the administrator password, to the journal database. In the worst-case scenario, where the journal log is centralized, users with access to it can have improper access to the FreeIPA administrator credentials. | |
Title | Freeipa: administrative user data leaked through systemd journal | |
First Time appeared |
Redhat
Redhat enterprise Linux |
|
Weaknesses | CWE-497 | |
CPEs | cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
Vendors & Products |
Redhat
Redhat enterprise Linux |
|
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: redhat
Published: 2025-01-15T12:55:30.964Z
Updated: 2025-01-15T14:29:30.192Z
Reserved: 2024-11-08T21:02:38.159Z
Link: CVE-2024-11029
Vulnrichment
Updated: 2025-01-15T14:29:20.405Z
NVD
Status : Received
Published: 2025-01-15T13:15:08.940
Modified: 2025-01-15T14:15:27.683
Link: CVE-2024-11029
Redhat
No data.