CVE-2023-5455

Description

A Cross-site request forgery vulnerability exists in ipa/session/login_password in all supported versions of IPA. This flaw allows an attacker to trick the user into submitting a request that could perform actions as the user, resulting in a loss of confidentiality and system integrity. During community penetration testing it was found that for certain HTTP end-points FreeIPA does not ensure CSRF protection. Due to implementation details one cannot use this flaw for reflection of a cookie representing already logged-in user. An attacker would always have to go through a new authentication attempt.

Software From Fixed in
redhat / enterprise_linux 7.0 7.0.x
redhat / enterprise_linux 8.0 8.0.x
redhat / enterprise_linux 8.4 8.4.x
redhat / enterprise_linux 9.0 9.0.x
redhat / enterprise_linux_desktop 7.0 7.0.x
fedoraproject / fedora 38 38.x
fedoraproject / fedora 39 39.x
fedoraproject / fedora 40 40.x
redhat / enterprise_linux_server 9.0 9.0.x
redhat / enterprise_linux_server 9.2 9.2.x
redhat / enterprise_linux_workstation 7.0 7.0.x
redhat / enterprise_linux_server_aus 8.2 8.2.x
redhat / enterprise_linux_server_aus 8.4 8.4.x
redhat / enterprise_linux_server_aus 8.6 8.6.x
redhat / enterprise_linux_server_aus 9.2 9.2.x
redhat / enterprise_linux_eus 8.6 8.6.x
redhat / enterprise_linux_eus 8.8 8.8.x
redhat / enterprise_linux_eus 9.0 9.0.x
redhat / enterprise_linux_eus 9.2 9.2.x
redhat / enterprise_linux_for_ibm_z_systems 7.0 7.0.x
redhat / enterprise_linux_for_ibm_z_systems 8.0 8.0.x
redhat / enterprise_linux_for_ibm_z_systems 9.0 9.0.x
redhat / enterprise_linux_for_power_big_endian 7.0 7.0.x
freeipa / freeipa - 4.6.10
freeipa / freeipa 4.10.0 4.10.3
freeipa / freeipa 4.11.0 4.11.0.x
freeipa / freeipa 4.11.0-beta1 4.11.0-beta1.x
freeipa / freeipa 4.7.0 4.9.14
redhat / enterprise_linux_server_tus 8.2 8.2.x
redhat / enterprise_linux_server_tus 8.4 8.4.x
redhat / enterprise_linux_server_tus 8.6 8.6.x
redhat / enterprise_linux_for_scientific_computing 7.0 7.0.x
redhat / enterprise_linux_server_update_services_for_sap_solutions 8.2 8.2.x
redhat / enterprise_linux_server_update_services_for_sap_solutions 8.6 8.6.x
redhat / enterprise_linux_server_update_services_for_sap_solutions 9.0 9.0.x
redhat / enterprise_linux_server_update_services_for_sap_solutions 9.2 9.2.x
redhat / enterprise_linux_for_ibm_z_systems_eus 8.6 8.6.x
redhat / enterprise_linux_for_ibm_z_systems_eus 8.8 8.8.x
redhat / enterprise_linux_for_ibm_z_systems_eus 9.0 9.0.x
redhat / enterprise_linux_for_ibm_z_systems_eus 9.2 9.2.x
redhat / enterprise_linux_for_power_little_endian_eus 8.6 8.6.x
redhat / enterprise_linux_for_power_little_endian_eus 8.8 8.8.x
redhat / enterprise_linux_for_power_little_endian_eus 9.0 9.0.x
redhat / enterprise_linux_for_power_little_endian_eus 9.2 9.2.x
redhat / enterprise_linux_for_power_little_endian 7.0 7.0.x
redhat / enterprise_linux_for_power_little_endian 8.0 8.0.x
redhat / enterprise_linux_for_power_little_endian 9.0 9.0.x
redhat / enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions 8.2 8.2.x
redhat / enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions 8.4 8.4.x
redhat / enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions 8.6 8.6.x
redhat / enterprise_linux_update_services_for_sap_solutions 9.0 9.0.x
redhat / enterprise_linux_update_services_for_sap_solutions 9.2 9.2.x
redhat / enterprise_linux_for_arm_64_eus 8.8 8.8.x
redhat / enterprise_linux_for_arm_64_eus 9.0 9.0.x
redhat / enterprise_linux_for_arm_64_eus 9.2 9.2.x
redhat / enterprise_linux_server_for_ibm_z_systems 9.2 9.2.x