A flaw was found in dogtag-pki and pki-core. The token authentication scheme can be bypassed with a LDAP injection. By passing the query string parameter sessionID=*, an attacker can authenticate with an existing session saved in the LDAP directory server, which may lead to escalation of privilege.
References
Configurations
No configuration.
History
21 Nov 2024, 08:35
Type | Values Removed | Values Added |
---|---|---|
References | () https://access.redhat.com/errata/RHSA-2024:4051 - | |
References | () https://access.redhat.com/errata/RHSA-2024:4070 - | |
References | () https://access.redhat.com/errata/RHSA-2024:4164 - | |
References | () https://access.redhat.com/errata/RHSA-2024:4165 - | |
References | () https://access.redhat.com/errata/RHSA-2024:4179 - | |
References | () https://access.redhat.com/errata/RHSA-2024:4222 - | |
References | () https://access.redhat.com/errata/RHSA-2024:4367 - | |
References | () https://access.redhat.com/errata/RHSA-2024:4403 - | |
References | () https://access.redhat.com/errata/RHSA-2024:4413 - | |
References | () https://access.redhat.com/security/cve/CVE-2023-4727 - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2232218 - |
09 Jul 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
08 Jul 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
02 Jul 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
01 Jul 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
27 Jun 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
24 Jun 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
24 Jun 2024, 05:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
13 Jun 2024, 18:36
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
11 Jun 2024, 21:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) A flaw was found in dogtag-pki and pki-core. The token authentication scheme can be bypassed with a LDAP injection. By passing the query string parameter sessionID=*, an attacker can authenticate with an existing session saved in the LDAP directory server, which may lead to escalation of privilege. |
11 Jun 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-11 20:15
Updated : 2024-11-21 08:35
NVD link : CVE-2023-4727
Mitre link : CVE-2023-4727
CVE.ORG link : CVE-2023-4727
JSON object : View
Products Affected
No product.
CWE
CWE-305
Authentication Bypass by Primary Weakness