5.3
CVE-2024-1481
- EPSS 0.25%
- Published 10.04.2024 21:15:06
- Last modified 21.11.2024 08:50:40
- Source secalert@redhat.com
- Teams watchlist Login
- Open Login
A flaw was found in FreeIPA. This issue may allow a remote attacker to craft a HTTP request with parameters that can be interpreted as command arguments to kinit on the FreeIPA server, which can lead to a denial of service.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
Collection URLhttps://github.com/freeipa/freeipa/
≫
Package
freeipa
Default Statusunaffected
Version
4.10.1
Status
affected
VendorRed Hat
≫
Product
Red Hat Enterprise Linux 8
Default Statusaffected
Version <
*
Version
8100020240307184541.6d180cd9
Status
unaffected
VendorRed Hat
≫
Product
Red Hat Enterprise Linux 8
Default Statusaffected
Version <
*
Version
8100020240307185118.fc00487d
Status
unaffected
VendorRed Hat
≫
Product
Red Hat Enterprise Linux 9
Default Statusaffected
Version <
*
Version
0:4.11.0-9.el9_4
Status
unaffected
VendorRed Hat
≫
Product
Red Hat Enterprise Linux 7
Default Statusunknown
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.25% | 0.479 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
secalert@redhat.com | 5.3 | 3.9 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.