CVE-2024-2698

A vulnerability was found in FreeIPA in how the initial implementation of MS-SFU by MIT Kerberos was missing a condition for granting the "forwardable" flag on S4U2Self tickets. Fixing this mistake required adding a special case for the check_allowed_to_delegate() function: If the target service argument is NULL, then it means the KDC is probing for general constrained delegation rules and not checking a specific S4U2Proxy request. In FreeIPA 4.11.0, the behavior of ipadb_match_acl() was modified to match the changes from upstream MIT Kerberos 1.20. However, a mistake resulting in this mechanism applies in cases where the target service argument is set AND where it is unset. This results in S4U2Proxy requests being accepted regardless of whether or not there is a matching service delegation rule.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:freeipa:freeipa:*:*:*:*:*:*:*:*
cpe:2.3:a:freeipa:freeipa:4.12.0:*:*:*:*:*:*:*
OR cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:9.2:*:*:*:*:*:*:*

History

25 Sep 2024, 14:19

Type Values Removed Values Added
CWE CWE-863
CVSS v2 : unknown
v3 : 7.1
v2 : unknown
v3 : 8.8
First Time Redhat enterprise Linux
Redhat
Redhat enterprise Linux Eus
Freeipa freeipa
Freeipa
References () https://access.redhat.com/errata/RHSA-2024:3754 - () https://access.redhat.com/errata/RHSA-2024:3754 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2024:3755 - () https://access.redhat.com/errata/RHSA-2024:3755 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2024:3757 - () https://access.redhat.com/errata/RHSA-2024:3757 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2024:3759 - () https://access.redhat.com/errata/RHSA-2024:3759 - Vendor Advisory
References () https://access.redhat.com/security/cve/CVE-2024-2698 - () https://access.redhat.com/security/cve/CVE-2024-2698 - Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2270353 - () https://bugzilla.redhat.com/show_bug.cgi?id=2270353 - Issue Tracking, Mitigation, Vendor Advisory
References () https://www.freeipa.org/release-notes/4-12-1.html - () https://www.freeipa.org/release-notes/4-12-1.html - Release Notes
CPE cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:9.2:*:*:*:*:*:*:*
cpe:2.3:a:freeipa:freeipa:4.12.0:*:*:*:*:*:*:*
cpe:2.3:a:freeipa:freeipa:*:*:*:*:*:*:*:*

16 Sep 2024, 20:15

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WT3JL7JQDIAFKKEFARWYES7GZNWGQNCI/', 'source': 'secalert@redhat.com'}

27 Jun 2024, 03:15

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WT3JL7JQDIAFKKEFARWYES7GZNWGQNCI/ -

13 Jun 2024, 18:36

Type Values Removed Values Added
Summary
  • (es) Se encontró una vulnerabilidad en FreeIPA en la que a la implementación inicial de MS-SFU por parte de MIT Kerberos le faltaba una condición para otorgar el indicador "reenviable" en los tickets S4U2Self. Para corregir este error fue necesario agregar un caso especial para la función check_allowed_to_delegate(): si el argumento del servicio de destino es NULL, entonces significa que el KDC está investigando reglas generales de delegación restringida y no verificando una solicitud S4U2Proxy específica. En FreeIPA 4.11.0, el comportamiento de ipadb_match_acl() se modificó para que coincida con los cambios del MIT Kerberos 1.20. Sin embargo, un error que resulta en este mecanismo se aplica en los casos en los que el argumento del servicio de destino está establecido Y donde no está establecido. Esto da como resultado que las solicitudes S4U2Proxy se acepten independientemente de si existe o no una regla de delegación de servicios coincidente.

12 Jun 2024, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-12 08:15

Updated : 2024-10-02 15:15


NVD link : CVE-2024-2698

Mitre link : CVE-2024-2698

CVE.ORG link : CVE-2024-2698


JSON object : View

Products Affected

redhat

  • enterprise_linux
  • enterprise_linux_eus

freeipa

  • freeipa
CWE
CWE-863

Incorrect Authorization

CWE-284

Improper Access Control