A Cross-site request forgery vulnerability exists in ipa/session/login_password in all supported versions of IPA. This flaw allows an attacker to trick the user into submitting a request that could perform actions as the user, resulting in a loss of confidentiality and system integrity. During community penetration testing it was found that for certain HTTP end-points FreeIPA does not ensure CSRF protection. Due to implementation details one cannot use this flaw for reflection of a cookie representing already logged-in user. An attacker would always have to go through a new authentication attempt.

Project Subscriptions

Vendors Products
Fedoraproject Subscribe
Freeipa Subscribe
Freeipa Subscribe
Codeready Linux Builder Subscribe
Enterprise Linux Subscribe
Enterprise Linux Desktop Subscribe
Enterprise Linux Eus Subscribe
Enterprise Linux For Arm 64 Eus Subscribe
Enterprise Linux For Ibm Z Systems Subscribe
Enterprise Linux For Ibm Z Systems Eus Subscribe
Enterprise Linux For Power Big Endian Subscribe
Enterprise Linux For Power Little Endian Subscribe
Enterprise Linux For Power Little Endian Eus Subscribe
Enterprise Linux For Scientific Computing Subscribe
Enterprise Linux Server Subscribe
Enterprise Linux Server Aus Subscribe
Enterprise Linux Server For Ibm Z Systems Subscribe
Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions Subscribe
Enterprise Linux Server Tus Subscribe
Enterprise Linux Server Update Services For Sap Solutions Subscribe
Enterprise Linux Update Services For Sap Solutions Subscribe
Enterprise Linux Workstation Subscribe
Rhel Aus Subscribe
Rhel E4s Subscribe
Rhel Eus Subscribe
Rhel Tus Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2023-57769 A Cross-site request forgery vulnerability exists in ipa/session/login_password in all supported versions of IPA. This flaw allows an attacker to trick the user into submitting a request that could perform actions as the user, resulting in a loss of confidentiality and system integrity. During community penetration testing it was found that for certain HTTP end-points FreeIPA does not ensure CSRF protection. Due to implementation details one cannot use this flaw for reflection of a cookie representing already logged-in user. An attacker would always have to go through a new authentication attempt.
Fixes

Solution

No solution given by the vendor.


Workaround

Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.

History

Fri, 22 Nov 2024 12:00:00 +0000


Thu, 14 Nov 2024 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Sep 2024 16:30:00 +0000


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-11-20T18:06:12.304Z

Reserved: 2023-10-09T04:39:08.777Z

Link: CVE-2023-5455

cve-icon Vulnrichment

Updated: 2024-08-02T07:59:44.726Z

cve-icon NVD

Status : Modified

Published: 2024-01-10T13:15:48.643

Modified: 2024-11-21T08:41:47.993

Link: CVE-2023-5455

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-01-10T06:30:00Z

Links: CVE-2023-5455 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses