Upstream information

CVE-2023-5455 at MITRE

Description

A Cross-site request forgery vulnerability exists in ipa/session/login_password in all supported versions of IPA. This flaw allows an attacker to trick the user into submitting a request that could perform actions as the user, resulting in a loss of confidentiality and system integrity. During community penetration testing it was found that for certain HTTP end-points FreeIPA does not ensure CSRF protection. Due to implementation details one cannot use this flaw for reflection of a cookie representing already logged-in user. An attacker would always have to go through a new authentication attempt.

Other Security Trackers

SUSE information

Overall state of this security issue: Does not affect SUSE products

This issue is currently rated as having moderate severity.

CVSS v3 Scores
  CNA (Red Hat) National Vulnerability Database
Base Score 6.5 6.5
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
Attack Vector Network Network
Attack Complexity Low Low
Privileges Required None None
User Interaction Required Required
Scope Unchanged Unchanged
Confidentiality Impact None None
Integrity Impact High High
Availability Impact None None
CVSSv3 Version 3.1 3.1
No SUSE Bugzilla entries cross referenced.

No SUSE Security Announcements cross referenced.

List of released packages

Product(s) Fixed package version(s) References
SUSE Liberty Linux 7
SUSE Liberty Linux 7 LTSS
  • ipa-client >= 4.6.8-5.el7_9.16
  • ipa-client-common >= 4.6.8-5.el7_9.16
  • ipa-common >= 4.6.8-5.el7_9.16
  • ipa-python-compat >= 4.6.8-5.el7_9.16
  • ipa-server >= 4.6.8-5.el7_9.16
  • ipa-server-common >= 4.6.8-5.el7_9.16
  • ipa-server-dns >= 4.6.8-5.el7_9.16
  • ipa-server-trust-ad >= 4.6.8-5.el7_9.16
  • python2-ipaclient >= 4.6.8-5.el7_9.16
  • python2-ipalib >= 4.6.8-5.el7_9.16
  • python2-ipaserver >= 4.6.8-5.el7_9.16
Patchnames:
RHSA-2024:0145
SUSE Liberty Linux 9
  • ipa-client >= 4.10.2-5.el9_3
  • ipa-client-common >= 4.10.2-5.el9_3
  • ipa-client-epn >= 4.10.2-5.el9_3
  • ipa-client-samba >= 4.10.2-5.el9_3
  • ipa-common >= 4.10.2-5.el9_3
  • ipa-selinux >= 4.10.2-5.el9_3
  • ipa-server >= 4.10.2-5.el9_3
  • ipa-server-common >= 4.10.2-5.el9_3
  • ipa-server-dns >= 4.10.2-5.el9_3
  • ipa-server-trust-ad >= 4.10.2-5.el9_3
  • python3-ipaclient >= 4.10.2-5.el9_3
  • python3-ipalib >= 4.10.2-5.el9_3
  • python3-ipaserver >= 4.10.2-5.el9_3
  • python3-ipatests >= 4.10.2-5.el9_3
Patchnames:
RHSA-2024:0141


SUSE Timeline for this CVE

CVE page created: Wed Jan 10 15:00:17 2024
CVE page last modified: Thu Jul 24 20:12:17 2025