ALAS2-2024-2457 --- ipaID: oval:org.secpod.oval:def:1702132 | Date: (C)2024-02-28 (M)2024-02-28 |
Class: PATCH | Family: unix |
A Cross-site request forgery vulnerability exists in ipa/session/login_password in all supported versions of IPA. This flaw allows an attacker to trick the user into submitting a request that could perform actions as the user, resulting in a loss of confidentiality and system integrity. During community penetration testing it was found that for certain HTTP end-points FreeIPA does not ensure CSRF protection. Due to implementation details one cannot use this flaw for reflection of a cookie representing already logged-in user. An attacker would always have to go through a new authentication attempt
Product: |
ipa |
python2-ipaserver |
python2-ipaclient |
python2-ipalib |