CVE-2024-2698

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-2698
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-2698.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-2698
Related
Published
2024-06-12T08:15:50Z
Modified
2024-11-11T14:45:52.532917Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A vulnerability was found in FreeIPA in how the initial implementation of MS-SFU by MIT Kerberos was missing a condition for granting the "forwardable" flag on S4U2Self tickets. Fixing this mistake required adding a special case for the checkallowedto_delegate() function: If the target service argument is NULL, then it means the KDC is probing for general constrained delegation rules and not checking a specific S4U2Proxy request.

In FreeIPA 4.11.0, the behavior of ipadbmatchacl() was modified to match the changes from upstream MIT Kerberos 1.20. However, a mistake resulting in this mechanism applies in cases where the target service argument is set AND where it is unset. This results in S4U2Proxy requests being accepted regardless of whether or not there is a matching service delegation rule.

References

Affected packages

Debian:12 / freeipa

Package

Name
freeipa
Purl
pkg:deb/debian/freeipa?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.9.11-1
4.9.11-1+exp1
4.9.11-2
4.10.1-1+exp1
4.10.1+dfsg1-1+exp1
4.10.2-1
4.10.2-2
4.10.2-2+exp1
4.11.1-1
4.11.1-1+exp1
4.11.1-2
4.11.1-2+exp1
4.11.1-2.1

Ecosystem specific

{
    "urgency": "unimportant"
}

Git / github.com/freeipa/freeipa

Affected ranges

Type
GIT
Repo
https://github.com/freeipa/freeipa
Events

Affected versions

Other

release-4-11-0
release-4-11-1