Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2024-0145

Опубликовано: 10 янв. 2024
Источник: oracle-oval
Платформа: Oracle Linux 7

Описание

ELSA-2024-0145: ipa security update (MODERATE)

[4.6.8-5.0.1]

  • Blank out header-logo.png product-name.png
  • Replace login-screen-logo.png [Orabug: 20362818]

[4.6.8-5.el7_9.16]

  • Resolves: RHEL-12570 ipa: Invalid CSRF protection

Обновленные пакеты

Oracle Linux 7

Oracle Linux aarch64

ipa-client

4.6.8-5.0.1.el7_9.16

ipa-client-common

4.6.8-5.0.1.el7_9.16

ipa-common

4.6.8-5.0.1.el7_9.16

ipa-python-compat

4.6.8-5.0.1.el7_9.16

ipa-server

4.6.8-5.0.1.el7_9.16

ipa-server-common

4.6.8-5.0.1.el7_9.16

ipa-server-dns

4.6.8-5.0.1.el7_9.16

ipa-server-trust-ad

4.6.8-5.0.1.el7_9.16

python2-ipaclient

4.6.8-5.0.1.el7_9.16

python2-ipalib

4.6.8-5.0.1.el7_9.16

python2-ipaserver

4.6.8-5.0.1.el7_9.16

Oracle Linux x86_64

ipa-client

4.6.8-5.0.1.el7_9.16

ipa-client-common

4.6.8-5.0.1.el7_9.16

ipa-common

4.6.8-5.0.1.el7_9.16

ipa-python-compat

4.6.8-5.0.1.el7_9.16

ipa-server

4.6.8-5.0.1.el7_9.16

ipa-server-common

4.6.8-5.0.1.el7_9.16

ipa-server-dns

4.6.8-5.0.1.el7_9.16

ipa-server-trust-ad

4.6.8-5.0.1.el7_9.16

python2-ipaclient

4.6.8-5.0.1.el7_9.16

python2-ipalib

4.6.8-5.0.1.el7_9.16

python2-ipaserver

4.6.8-5.0.1.el7_9.16

Связанные CVE

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 1 года назад

A Cross-site request forgery vulnerability exists in ipa/session/login_password in all supported versions of IPA. This flaw allows an attacker to trick the user into submitting a request that could perform actions as the user, resulting in a loss of confidentiality and system integrity. During community penetration testing it was found that for certain HTTP end-points FreeIPA does not ensure CSRF protection. Due to implementation details one cannot use this flaw for reflection of a cookie representing already logged-in user. An attacker would always have to go through a new authentication attempt.

CVSS3: 6.5
redhat
больше 1 года назад

A Cross-site request forgery vulnerability exists in ipa/session/login_password in all supported versions of IPA. This flaw allows an attacker to trick the user into submitting a request that could perform actions as the user, resulting in a loss of confidentiality and system integrity. During community penetration testing it was found that for certain HTTP end-points FreeIPA does not ensure CSRF protection. Due to implementation details one cannot use this flaw for reflection of a cookie representing already logged-in user. An attacker would always have to go through a new authentication attempt.

CVSS3: 6.5
nvd
больше 1 года назад

A Cross-site request forgery vulnerability exists in ipa/session/login_password in all supported versions of IPA. This flaw allows an attacker to trick the user into submitting a request that could perform actions as the user, resulting in a loss of confidentiality and system integrity. During community penetration testing it was found that for certain HTTP end-points FreeIPA does not ensure CSRF protection. Due to implementation details one cannot use this flaw for reflection of a cookie representing already logged-in user. An attacker would always have to go through a new authentication attempt.

CVSS3: 6.5
debian
больше 1 года назад

A Cross-site request forgery vulnerability exists in ipa/session/login ...

CVSS3: 6.5
redos
около 1 года назад

Уязвимость IPA

Уязвимость ELSA-2024-0145