FreeIPA 4.x with API version 2.213 allows a remote authenticated users to bypass intended account-locking restrictions via an unlock action with an old session ID (for the same user account) that had been created for an earlier session. NOTE: Vendor states that issue does not exist in product and does not recognize this report as a valid security concern
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/143532/FreeIPA-2.213-Session-Hijacking.html | Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/143532/FreeIPA-2.213-Session-Hijacking.html | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:07
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/143532/FreeIPA-2.213-Session-Hijacking.html - Third Party Advisory, VDB Entry |
07 Nov 2023, 02:38
Type | Values Removed | Values Added |
---|---|---|
Summary | FreeIPA 4.x with API version 2.213 allows a remote authenticated users to bypass intended account-locking restrictions via an unlock action with an old session ID (for the same user account) that had been created for an earlier session. NOTE: Vendor states that issue does not exist in product and does not recognize this report as a valid security concern |
Information
Published : 2017-09-28 01:29
Updated : 2024-11-21 03:07
NVD link : CVE-2017-11191
Mitre link : CVE-2017-11191
CVE.ORG link : CVE-2017-11191
JSON object : View
Products Affected
freeipa
- freeipa
CWE
CWE-384
Session Fixation