CVE-2017-12169
Published: 10 January 2018
It was found that FreeIPA 4.2.0 and later could disclose password hashes to users having the 'System: Read Stage Users' permission. A remote, authenticated attacker could potentially use this flaw to disclose the password hashes belonging to Stage Users. This security issue does not result in disclosure of password hashes belonging to active standard users. NOTE: some developers feel that this report is a suggestion for a design change to Stage User activation, not a statement of a vulnerability.
Notes
Author | Note |
---|---|
ebarretto | No fix available as of 2019-02-14 |
Priority
Status
Package | Release | Status |
---|---|---|
freeipa Launchpad, Ubuntu, Debian |
groovy |
Ignored
(end of life)
|
hirsute |
Ignored
(end of life)
|
|
kinetic |
Ignored
(end of life, was needed)
|
|
xenial |
Needed
|
|
artful |
Ignored
(end of life)
|
|
bionic |
Needed
|
|
cosmic |
Ignored
(end of life)
|
|
disco |
Ignored
(end of life)
|
|
eoan |
Ignored
(end of life)
|
|
focal |
Needed
|
|
impish |
Ignored
(end of life)
|
|
jammy |
Needed
|
|
trusty |
Needed
|
|
upstream |
Needed
|
|
zesty |
Ignored
(end of life)
|
|
mantic |
Needed
|
|
lunar |
Ignored
(end of life, was needed)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |