vulnerability

Red Hat: CVE-2023-4727: dogtag ca: token authentication bypass vulnerability (Multiple Advisories)

Severity
7
CVSS
(AV:A/AC:H/Au:N/C:C/I:C/A:C)
Published
06/11/2024
Added
06/26/2024
Modified
09/13/2024

Description

A flaw was found in dogtag-pki and pki-core. The token authentication scheme can be bypassed with a LDAP injection. By passing the query string parameter sessionID=*, an attacker can authenticate with an existing session saved in the LDAP directory server, which may lead to escalation of privilege.

Solution(s)

redhat-upgrade-idm-jssredhat-upgrade-idm-jss-debuginforedhat-upgrade-idm-jss-javadocredhat-upgrade-idm-ldapjdkredhat-upgrade-idm-ldapjdk-javadocredhat-upgrade-idm-pki-acmeredhat-upgrade-idm-pki-baseredhat-upgrade-idm-pki-base-javaredhat-upgrade-idm-pki-caredhat-upgrade-idm-pki-estredhat-upgrade-idm-pki-javaredhat-upgrade-idm-pki-kraredhat-upgrade-idm-pki-serverredhat-upgrade-idm-pki-symkeyredhat-upgrade-idm-pki-symkey-debuginforedhat-upgrade-idm-pki-toolsredhat-upgrade-idm-pki-tools-debuginforedhat-upgrade-idm-tomcatjssredhat-upgrade-jssredhat-upgrade-jss-debuginforedhat-upgrade-jss-debugsourceredhat-upgrade-jss-javadocredhat-upgrade-ldapjdkredhat-upgrade-ldapjdk-javadocredhat-upgrade-pki-baseredhat-upgrade-pki-base-javaredhat-upgrade-pki-caredhat-upgrade-pki-core-debuginforedhat-upgrade-pki-core-debugsourceredhat-upgrade-pki-javadocredhat-upgrade-pki-kraredhat-upgrade-pki-serverredhat-upgrade-pki-symkeyredhat-upgrade-pki-toolsredhat-upgrade-python3-idm-pkiredhat-upgrade-resteasyredhat-upgrade-resteasy-javadocredhat-upgrade-tomcatjss
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.