CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
AI Score
Confidence
Low
EPSS
Percentile
35.7%
Issue Overview:
A Cross-site request forgery vulnerability exists in ipa/session/login_password in all supported versions of IPA. This flaw allows an attacker to trick the user into submitting a request that could perform actions as the user, resulting in a loss of confidentiality and system integrity. During community penetration testing it was found that for certain HTTP end-points FreeIPA does not ensure CSRF protection. Due to implementation details one cannot use this flaw for reflection of a cookie representing already logged-in user. An attacker would always have to go through a new authentication attempt. (CVE-2023-5455)
Affected Packages:
ipa
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update ipa to update your system.
New Packages:
aarch64:
ipa-server-4.6.8-5.amzn2.4.3.aarch64
ipa-server-trust-ad-4.6.8-5.amzn2.4.3.aarch64
ipa-client-4.6.8-5.amzn2.4.3.aarch64
ipa-debuginfo-4.6.8-5.amzn2.4.3.aarch64
i686:
ipa-server-4.6.8-5.amzn2.4.3.i686
ipa-server-trust-ad-4.6.8-5.amzn2.4.3.i686
ipa-client-4.6.8-5.amzn2.4.3.i686
ipa-debuginfo-4.6.8-5.amzn2.4.3.i686
noarch:
python2-ipaserver-4.6.8-5.amzn2.4.3.noarch
ipa-server-common-4.6.8-5.amzn2.4.3.noarch
ipa-server-dns-4.6.8-5.amzn2.4.3.noarch
python2-ipaclient-4.6.8-5.amzn2.4.3.noarch
ipa-client-common-4.6.8-5.amzn2.4.3.noarch
ipa-python-compat-4.6.8-5.amzn2.4.3.noarch
python2-ipalib-4.6.8-5.amzn2.4.3.noarch
ipa-common-4.6.8-5.amzn2.4.3.noarch
src:
ipa-4.6.8-5.amzn2.4.3.src
x86_64:
ipa-server-4.6.8-5.amzn2.4.3.x86_64
ipa-server-trust-ad-4.6.8-5.amzn2.4.3.x86_64
ipa-client-4.6.8-5.amzn2.4.3.x86_64
ipa-debuginfo-4.6.8-5.amzn2.4.3.x86_64
Red Hat: CVE-2023-5455
Mitre: CVE-2023-5455
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 2 | aarch64 | ipa-server | < 4.6.8-5.amzn2.4.3 | ipa-server-4.6.8-5.amzn2.4.3.aarch64.rpm |
Amazon Linux | 2 | aarch64 | ipa-server-trust-ad | < 4.6.8-5.amzn2.4.3 | ipa-server-trust-ad-4.6.8-5.amzn2.4.3.aarch64.rpm |
Amazon Linux | 2 | aarch64 | ipa-client | < 4.6.8-5.amzn2.4.3 | ipa-client-4.6.8-5.amzn2.4.3.aarch64.rpm |
Amazon Linux | 2 | aarch64 | ipa-debuginfo | < 4.6.8-5.amzn2.4.3 | ipa-debuginfo-4.6.8-5.amzn2.4.3.aarch64.rpm |
Amazon Linux | 2 | i686 | ipa-server | < 4.6.8-5.amzn2.4.3 | ipa-server-4.6.8-5.amzn2.4.3.i686.rpm |
Amazon Linux | 2 | i686 | ipa-server-trust-ad | < 4.6.8-5.amzn2.4.3 | ipa-server-trust-ad-4.6.8-5.amzn2.4.3.i686.rpm |
Amazon Linux | 2 | i686 | ipa-client | < 4.6.8-5.amzn2.4.3 | ipa-client-4.6.8-5.amzn2.4.3.i686.rpm |
Amazon Linux | 2 | i686 | ipa-debuginfo | < 4.6.8-5.amzn2.4.3 | ipa-debuginfo-4.6.8-5.amzn2.4.3.i686.rpm |
Amazon Linux | 2 | noarch | python2-ipaserver | < 4.6.8-5.amzn2.4.3 | python2-ipaserver-4.6.8-5.amzn2.4.3.noarch.rpm |
Amazon Linux | 2 | noarch | ipa-server-common | < 4.6.8-5.amzn2.4.3 | ipa-server-common-4.6.8-5.amzn2.4.3.noarch.rpm |
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
AI Score
Confidence
Low
EPSS
Percentile
35.7%