Freeipa

Freeipa

20 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.22%
  • Veröffentlicht 10.01.2018 15:29:00
  • Zuletzt bearbeitet 21.11.2024 03:08:58

It was found that FreeIPA 4.2.0 and later could disclose password hashes to users having the 'System: Read Stage Users' permission. A remote, authenticated attacker could potentially use this flaw to disclose the password hashes belonging to Stage Us...

  • EPSS 0.07%
  • Veröffentlicht 28.09.2017 01:29:01
  • Zuletzt bearbeitet 20.04.2025 01:37:25

FreeIPA 4.x with API version 2.213 allows a remote authenticated users to bypass intended account-locking restrictions via an unlock action with an old session ID (for the same user account) that had been created for an earlier session. NOTE: Vendor ...

  • EPSS 0.3%
  • Veröffentlicht 21.09.2017 14:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

ipa-kra-install in FreeIPA before 4.2.2 puts the CA agent certificate and private key in /etc/httpd/alias/kra-agent.pem, which is world readable.

Exploit
  • EPSS 0.2%
  • Veröffentlicht 20.09.2017 16:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

FreeIPA might display user data improperly via vectors involving non-printable characters.

  • EPSS 1.53%
  • Veröffentlicht 28.08.2017 15:29:01
  • Zuletzt bearbeitet 20.04.2025 01:37:25

FreeIPA uses a default password policy that locks an account after 5 unsuccessful authentication attempts, which allows remote attackers to cause a denial of service by locking out the account in which system services run on.

  • EPSS 0.17%
  • Veröffentlicht 27.06.2017 20:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

FreeIPA 4.4.0 allows remote attackers to request an arbitrary SAN name for services.

  • EPSS 0.34%
  • Veröffentlicht 07.09.2016 20:59:01
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The cert_revoke command in FreeIPA does not check for the "revoke certificate" permission, which allows remote authenticated users to revoke arbitrary certificates by leveraging the "retrieve certificate" permission.

  • EPSS 1.18%
  • Veröffentlicht 30.03.2015 14:59:04
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The get_user_grouplist function in the extdom plug-in in FreeIPA before 4.1.4 does not properly reallocate memory when processing user accounts, which allows remote attackers to cause a denial of service (crash) via a group list request for a user th...

  • EPSS 0.36%
  • Veröffentlicht 28.11.2014 15:59:01
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Cross-site scripting (XSS) vulnerability in the Web UI in FreeIPA 4.x before 4.1.2 allows remote attackers to inject arbitrary web script or HTML via vectors related to breadcrumb navigation.

  • EPSS 0.41%
  • Veröffentlicht 19.11.2014 18:59:08
  • Zuletzt bearbeitet 12.04.2025 10:46:40

FreeIPA 4.0.x before 4.0.5 and 4.1.x before 4.1.1, when 2FA is enabled, allows remote attackers to bypass the password requirement of the two-factor authentication leveraging an enabled OTP token, which triggers an anonymous bind.