A flaw was found in dogtag-pki and pki-core. The token authentication scheme can be bypassed with a LDAP injection. By passing the query string parameter sessionID=*, an attacker can authenticate with an existing session saved in the LDAP directory server, which may lead to escalation of privilege.
Metrics
Affected Vendors & Products
References
History
Thu, 21 Nov 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | ||
Vendors & Products |
Redhat certificate System
|
|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-12-06T14:50:26.889Z
Reserved: 2023-09-01T20:44:55.077Z
Link: CVE-2023-4727

Updated: 2024-08-02T07:38:00.502Z

Status : Awaiting Analysis
Published: 2024-06-11T20:15:09.733
Modified: 2024-11-21T08:35:50.450
Link: CVE-2023-4727
