FreeIPA 4.9.1

CPE Details

FreeIPA 4.9.1
4.9.1
2024-01-16
18h04 +00:00
2024-01-16
18h04 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:freeipa:freeipa:4.9.1:*:*:*:*:*:*:*

Informations

Vendor

freeipa

Product

freeipa

Version

4.9.1

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2023-5455 2024-01-10
12h33 +00:00
A Cross-site request forgery vulnerability exists in ipa/session/login_password in all supported versions of IPA. This flaw allows an attacker to trick the user into submitting a request that could perform actions as the user, resulting in a loss of confidentiality and system integrity. During community penetration testing it was found that for certain HTTP end-points FreeIPA does not ensure CSRF protection. Due to implementation details one cannot use this flaw for reflection of a cookie representing already logged-in user. An attacker would always have to go through a new authentication attempt.
6.5
Medium
CVE-2019-14826 2019-09-17
13h09 +00:00
A flaw was found in FreeIPA versions 4.5.0 and later. Session cookies were retained in the cache after logout. An attacker could abuse this flaw if they obtain previously valid session cookies and can use this to gain access to the session.
4.4
Medium
CVE-2017-12169 2018-01-10
15h00 +00:00
It was found that FreeIPA 4.2.0 and later could disclose password hashes to users having the 'System: Read Stage Users' permission. A remote, authenticated attacker could potentially use this flaw to disclose the password hashes belonging to Stage Users. This security issue does not result in disclosure of password hashes belonging to active standard users. NOTE: some developers feel that this report is a suggestion for a design change to Stage User activation, not a statement of a vulnerability.
7.5
High