cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2023-5455,https://securityvulnerability.io/vulnerability/CVE-2023-5455,Ipa: invalid csrf protection,"A Cross-site request forgery vulnerability exists in ipa/session/login_password in all supported versions of IPA. This flaw allows an attacker to trick the user into submitting a request that could perform actions as the user, resulting in a loss of confidentiality and system integrity. During community penetration testing it was found that for certain HTTP end-points FreeIPA does not ensure CSRF protection. Due to implementation details one cannot use this flaw for reflection of a cookie representing already logged-in user. An attacker would always have to go through a new authentication attempt.",Red Hat,"ipa,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8.2 Advanced Update Support,Red Hat Enterprise Linux 8.2 Telecommunications Update Service,Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions,Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support,Red Hat Enterprise Linux 8.4 Telecommunications Update Service,Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions,Red Hat Enterprise Linux 8.6 Extended Update Support,Red Hat Enterprise Linux 8.8 Extended Update Support,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9.0 Extended Update Support,Red Hat Enterprise Linux 9.2 Extended Update Support,Red Hat Enterprise Linux 6,Fedora",6.5,MEDIUM,0.0007900000200606883,false,false,false,false,,false,false,2024-01-10T12:33:00.336Z,0 CVE-2020-1722,https://securityvulnerability.io/vulnerability/CVE-2020-1722,,"A flaw was found in all ipa versions 4.x.x through 4.8.0. When sending a very long password (>= 1,000,000 characters) to the server, the password hashing process could exhaust memory and CPU leading to a denial of service and the website becoming unresponsive. The highest threat from this vulnerability is to system availability.",Red Hat,Ipa,5.3,MEDIUM,0.0008699999889358878,false,false,false,false,,false,false,2020-04-27T20:46:52.000Z,0 CVE-2019-14867,https://securityvulnerability.io/vulnerability/CVE-2019-14867,,"A flaw was found in IPA, all 4.6.x versions before 4.6.7, all 4.7.x versions before 4.7.4 and all 4.8.x versions before 4.8.3, in the way the internal function ber_scanf() was used in some components of the IPA server, which parsed kerberos key data. An unauthenticated attacker who could trigger parsing of the krb principal key could cause the IPA server to crash or in some conditions, cause arbitrary code to be executed on the server hosting the IPA server.",Red Hat,Ipa,8.8,HIGH,0.015639999881386757,false,false,false,false,,false,false,2019-11-27T08:05:17.000Z,0 CVE-2019-10195,https://securityvulnerability.io/vulnerability/CVE-2019-10195,,"A flaw was found in IPA, all 4.6.x versions before 4.6.7, all 4.7.x versions before 4.7.4 and all 4.8.x versions before 4.8.3, in the way that FreeIPA's batch processing API logged operations. This included passing user passwords in clear text on FreeIPA masters. Batch processing of commands with passwords as arguments or options is not performed by default in FreeIPA but is possible by third-party components. An attacker having access to system logs on FreeIPA masters could use this flaw to produce log file content with passwords exposed.",Red Hat,Ipa,5.7,MEDIUM,0.001769999973475933,false,false,false,false,,false,false,2019-11-27T07:55:13.000Z,0 CVE-2019-14826,https://securityvulnerability.io/vulnerability/CVE-2019-14826,,A flaw was found in FreeIPA versions 4.5.0 and later. Session cookies were retained in the cache after logout. An attacker could abuse this flaw if they obtain previously valid session cookies and can use this to gain access to the session.,Red Hat,Ipa,5.6,MEDIUM,0.0004400000034365803,false,false,false,false,,false,false,2019-09-17T15:09:31.000Z,0 CVE-2017-2590,https://securityvulnerability.io/vulnerability/CVE-2017-2590,,"A vulnerability was found in ipa before 4.4. IdM's ca-del, ca-disable, and ca-enable commands did not properly check the user's permissions while modifying CAs in Dogtag. An authenticated, unauthorized attacker could use this flaw to delete, disable, or enable CAs causing various denial of service problems with certificate issuance, OCSP signing, and deletion of secret keys.",Red Hat,Ipa,8.1,HIGH,0.0015899999998509884,false,false,false,false,,false,false,2018-07-27T18:00:00.000Z,0