Freeipa Freeipa 4.12.0

CPE Details

Freeipa Freeipa 4.12.0
4.12.0
2025-01-02
19h19 +00:00
2025-01-02
19h19 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:freeipa:freeipa:4.12.0:*:*:*:*:*:*:*

Informations

Vendor

freeipa

Product

freeipa

Version

4.12.0

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2024-2698 2024-06-12 08h03 +00:00 A vulnerability was found in FreeIPA in how the initial implementation of MS-SFU by MIT Kerberos was missing a condition for granting the "forwardable" flag on S4U2Self tickets. Fixing this mistake required adding a special case for the check_allowed_to_delegate() function: If the target service argument is NULL, then it means the KDC is probing for general constrained delegation rules and not checking a specific S4U2Proxy request. In FreeIPA 4.11.0, the behavior of ipadb_match_acl() was modified to match the changes from upstream MIT Kerberos 1.20. However, a mistake resulting in this mechanism applies in cases where the target service argument is set AND where it is unset. This results in S4U2Proxy requests being accepted regardless of whether or not there is a matching service delegation rule.
8.8
High
CVE-2019-14826 2019-09-17 13h09 +00:00 A flaw was found in FreeIPA versions 4.5.0 and later. Session cookies were retained in the cache after logout. An attacker could abuse this flaw if they obtain previously valid session cookies and can use this to gain access to the session.
4.4
Medium
CVE-2017-12169 2018-01-10 15h00 +00:00 It was found that FreeIPA 4.2.0 and later could disclose password hashes to users having the 'System: Read Stage Users' permission. A remote, authenticated attacker could potentially use this flaw to disclose the password hashes belonging to Stage Users. This security issue does not result in disclosure of password hashes belonging to active standard users. NOTE: some developers feel that this report is a suggestion for a design change to Stage User activation, not a statement of a vulnerability.
7.5
High