CVE-2023-5455

6.5 MEDIUM
Published: January 10, 2024 Modified: March 18, 2026
View on NVD

Description

A Cross-site request forgery vulnerability exists in ipa/session/login_password in all supported versions of IPA. This flaw allows an attacker to trick the user into submitting a request that could perform actions as the user, resulting in a loss of confidentiality and system integrity. During community penetration testing it was found that for certain HTTP end-points FreeIPA does not ensure CSRF protection. Due to implementation details one cannot use this flaw for reflection of a cookie representing already logged-in user. An attacker would always have to go through a new authentication attempt.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:0137
Source: secalert@redhat.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:0138
Source: secalert@redhat.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:0139
Source: secalert@redhat.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:0140
Source: secalert@redhat.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:0141
Source: secalert@redhat.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:0142
Source: secalert@redhat.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:0143
Source: secalert@redhat.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:0144
Source: secalert@redhat.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:0145
Source: secalert@redhat.com
Third Party Advisory
https://access.redhat.com/security/cve/CVE-2023-5455
Source: secalert@redhat.com
Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2242828
Source: secalert@redhat.com
Issue Tracking Third Party Advisory
https://www.freeipa.org/release-notes/4-10-3.html
Source: secalert@redhat.com
Release Notes
https://www.freeipa.org/release-notes/4-11-1.html
Source: secalert@redhat.com
Release Notes
https://www.freeipa.org/release-notes/4-6-10.html
Source: secalert@redhat.com
Release Notes
https://www.freeipa.org/release-notes/4-9-14.html
Source: secalert@redhat.com
Release Notes
https://access.redhat.com/errata/RHSA-2024:0137
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:0138
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:0139
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:0140
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:0141
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:0142
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:0143
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:0144
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:0145
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:0252
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/security/cve/CVE-2023-5455
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2242828
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Third Party Advisory
https://www.freeipa.org/release-notes/4-10-3.html
Source: af854a3a-2127-422b-91ae-364da2661108
Release Notes
https://www.freeipa.org/release-notes/4-11-1.html
Source: af854a3a-2127-422b-91ae-364da2661108
Release Notes
https://www.freeipa.org/release-notes/4-6-10.html
Source: af854a3a-2127-422b-91ae-364da2661108
Release Notes
https://www.freeipa.org/release-notes/4-9-14.html
Source: af854a3a-2127-422b-91ae-364da2661108
Release Notes

33 reference(s) from NVD

Quick Stats

CVSS v3 Score
6.5 / 10.0
EPSS (Exploit Probability)
0.3%
53th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

fedoraproject freeipa redhat