Логотип exploitDog
bind: "CVE-2023-5455"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2023-5455"

Количество 11

Количество 11

ubuntu логотип

CVE-2023-5455

около 2 лет назад

A Cross-site request forgery vulnerability exists in ipa/session/login_password in all supported versions of IPA. This flaw allows an attacker to trick the user into submitting a request that could perform actions as the user, resulting in a loss of confidentiality and system integrity. During community penetration testing it was found that for certain HTTP end-points FreeIPA does not ensure CSRF protection. Due to implementation details one cannot use this flaw for reflection of a cookie representing already logged-in user. An attacker would always have to go through a new authentication attempt.

CVSS3: 6.5
EPSS: Низкий
redhat логотип

CVE-2023-5455

около 2 лет назад

A Cross-site request forgery vulnerability exists in ipa/session/login_password in all supported versions of IPA. This flaw allows an attacker to trick the user into submitting a request that could perform actions as the user, resulting in a loss of confidentiality and system integrity. During community penetration testing it was found that for certain HTTP end-points FreeIPA does not ensure CSRF protection. Due to implementation details one cannot use this flaw for reflection of a cookie representing already logged-in user. An attacker would always have to go through a new authentication attempt.

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2023-5455

около 2 лет назад

A Cross-site request forgery vulnerability exists in ipa/session/login_password in all supported versions of IPA. This flaw allows an attacker to trick the user into submitting a request that could perform actions as the user, resulting in a loss of confidentiality and system integrity. During community penetration testing it was found that for certain HTTP end-points FreeIPA does not ensure CSRF protection. Due to implementation details one cannot use this flaw for reflection of a cookie representing already logged-in user. An attacker would always have to go through a new authentication attempt.

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2023-5455

около 2 лет назад

A Cross-site request forgery vulnerability exists in ipa/session/login ...

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-45hh-rj6v-548f

около 2 лет назад

A Cross-site request forgery vulnerability exists in ipa/session/login_password in all supported versions of IPA. This flaw allows an attacker to trick the user into submitting a request that could perform actions as the user, resulting in a loss of confidentiality and system integrity. During community penetration testing it was found that for certain HTTP end-points FreeIPA does not ensure CSRF protection. Due to implementation details one cannot use this flaw for reflection of a cookie representing already logged-in user. An attacker would always have to go through a new authentication attempt.

CVSS3: 6.5
EPSS: Низкий
oracle-oval логотип

ELSA-2024-0145

около 2 лет назад

ELSA-2024-0145: ipa security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-0141

около 2 лет назад

ELSA-2024-0141: ipa security update (MODERATE)

EPSS: Низкий
fstec логотип

BDU:2024-02540

около 2 лет назад

Уязвимость компонента login_password сервера FreeIpa, позволяющая нарушителю осуществить CSRF-атаку

CVSS3: 6.5
EPSS: Низкий
redos логотип

ROS-20240402-09

почти 2 года назад

Уязвимость IPA

CVSS3: 6.5
EPSS: Низкий
rocky логотип

RLSA-2024:0143

около 2 лет назад

Moderate: idm:DL1 security update

EPSS: Низкий
oracle-oval логотип

ELSA-2024-0143

около 2 лет назад

ELSA-2024-0143: idm:DL1 security update (MODERATE)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-5455

A Cross-site request forgery vulnerability exists in ipa/session/login_password in all supported versions of IPA. This flaw allows an attacker to trick the user into submitting a request that could perform actions as the user, resulting in a loss of confidentiality and system integrity. During community penetration testing it was found that for certain HTTP end-points FreeIPA does not ensure CSRF protection. Due to implementation details one cannot use this flaw for reflection of a cookie representing already logged-in user. An attacker would always have to go through a new authentication attempt.

CVSS3: 6.5
0%
Низкий
около 2 лет назад
redhat логотип
CVE-2023-5455

A Cross-site request forgery vulnerability exists in ipa/session/login_password in all supported versions of IPA. This flaw allows an attacker to trick the user into submitting a request that could perform actions as the user, resulting in a loss of confidentiality and system integrity. During community penetration testing it was found that for certain HTTP end-points FreeIPA does not ensure CSRF protection. Due to implementation details one cannot use this flaw for reflection of a cookie representing already logged-in user. An attacker would always have to go through a new authentication attempt.

CVSS3: 6.5
0%
Низкий
около 2 лет назад
nvd логотип
CVE-2023-5455

A Cross-site request forgery vulnerability exists in ipa/session/login_password in all supported versions of IPA. This flaw allows an attacker to trick the user into submitting a request that could perform actions as the user, resulting in a loss of confidentiality and system integrity. During community penetration testing it was found that for certain HTTP end-points FreeIPA does not ensure CSRF protection. Due to implementation details one cannot use this flaw for reflection of a cookie representing already logged-in user. An attacker would always have to go through a new authentication attempt.

CVSS3: 6.5
0%
Низкий
около 2 лет назад
debian логотип
CVE-2023-5455

A Cross-site request forgery vulnerability exists in ipa/session/login ...

CVSS3: 6.5
0%
Низкий
около 2 лет назад
github логотип
GHSA-45hh-rj6v-548f

A Cross-site request forgery vulnerability exists in ipa/session/login_password in all supported versions of IPA. This flaw allows an attacker to trick the user into submitting a request that could perform actions as the user, resulting in a loss of confidentiality and system integrity. During community penetration testing it was found that for certain HTTP end-points FreeIPA does not ensure CSRF protection. Due to implementation details one cannot use this flaw for reflection of a cookie representing already logged-in user. An attacker would always have to go through a new authentication attempt.

CVSS3: 6.5
0%
Низкий
около 2 лет назад
oracle-oval логотип
ELSA-2024-0145

ELSA-2024-0145: ipa security update (MODERATE)

около 2 лет назад
oracle-oval логотип
ELSA-2024-0141

ELSA-2024-0141: ipa security update (MODERATE)

около 2 лет назад
fstec логотип
BDU:2024-02540

Уязвимость компонента login_password сервера FreeIpa, позволяющая нарушителю осуществить CSRF-атаку

CVSS3: 6.5
0%
Низкий
около 2 лет назад
redos логотип
ROS-20240402-09

Уязвимость IPA

CVSS3: 6.5
0%
Низкий
почти 2 года назад
rocky логотип
RLSA-2024:0143

Moderate: idm:DL1 security update

около 2 лет назад
oracle-oval логотип
ELSA-2024-0143

ELSA-2024-0143: idm:DL1 security update (MODERATE)

около 2 лет назад

Уязвимостей на страницу