Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-4727

Опубликовано: 11 июн. 2024
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

A flaw was found in dogtag-pki and pki-core. The token authentication scheme can be bypassed with a LDAP injection. By passing the query string parameter sessionID=*, an attacker can authenticate with an existing session saved in the LDAP directory server, which may lead to escalation of privilege.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6pki-coreOut of support scope
Red Hat Certificate System 10.4 EUS for RHEL-8redhat-pkiFixedRHSA-2024:407024.06.2024
Red Hat Enterprise Linux 7pki-coreFixedRHSA-2024:422202.07.2024
Red Hat Enterprise Linux 8pki-coreFixedRHSA-2024:436708.07.2024
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Supportpki-coreFixedRHSA-2024:416427.06.2024
Red Hat Enterprise Linux 8.4 Telecommunications Update Servicepki-coreFixedRHSA-2024:416427.06.2024
Red Hat Enterprise Linux 8.4 Update Services for SAP Solutionspki-coreFixedRHSA-2024:416427.06.2024
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Supportpki-coreFixedRHSA-2024:440309.07.2024
Red Hat Enterprise Linux 8.6 Telecommunications Update Servicepki-coreFixedRHSA-2024:440309.07.2024
Red Hat Enterprise Linux 8.6 Update Services for SAP Solutionspki-coreFixedRHSA-2024:440309.07.2024

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-305
https://bugzilla.redhat.com/show_bug.cgi?id=2232218ca: token authentication bypass vulnerability

EPSS

Процентиль: 52%
0.00294
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 1 года назад

A flaw was found in dogtag-pki and pki-core. The token authentication scheme can be bypassed with a LDAP injection. By passing the query string parameter sessionID=*, an attacker can authenticate with an existing session saved in the LDAP directory server, which may lead to escalation of privilege.

CVSS3: 7.5
nvd
около 1 года назад

A flaw was found in dogtag-pki and pki-core. The token authentication scheme can be bypassed with a LDAP injection. By passing the query string parameter sessionID=*, an attacker can authenticate with an existing session saved in the LDAP directory server, which may lead to escalation of privilege.

CVSS3: 7.5
debian
около 1 года назад

A flaw was found in dogtag-pki and pki-core. The token authentication ...

CVSS3: 7.5
redos
5 месяцев назад

Уязвимость pki-server

rocky
12 месяцев назад

Important: pki-core security update

EPSS

Процентиль: 52%
0.00294
Низкий

7.5 High

CVSS3

Уязвимость CVE-2023-4727