CVE-2024-2698

A vulnerability was found in FreeIPA in how the initial implementation of MS-SFU by MIT Kerberos was missing a condition for granting the "forwardable" flag on S4U2Self tickets. Fixing this mistake required adding a special case for the check_allowed_to_delegate() function: If the target service argument is NULL, then it means the KDC is probing for general constrained delegation rules and not checking a specific S4U2Proxy request. In FreeIPA 4.11.0, the behavior of ipadb_match_acl() was modified to match the changes from upstream MIT Kerberos 1.20. However, a mistake resulting in this mechanism applies in cases where the target service argument is set AND where it is unset. This results in S4U2Proxy requests being accepted regardless of whether or not there is a matching service delegation rule.
CVSS

No CVSS.

Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:freeipa:freeipa:*:*:*:*:*:*:*:*
cpe:2.3:a:freeipa:freeipa:4.12.0:*:*:*:*:*:*:*
OR cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:9.2:*:*:*:*:*:*:*

History

24 Nov 2024, 17:15

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WT3JL7JQDIAFKKEFARWYES7GZNWGQNCI/ -
CVSS v2 : unknown
v3 : 8.8
v2 : unknown
v3 : unknown

25 Sep 2024, 14:19

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
References () https://access.redhat.com/errata/RHSA-2024:3757 - () https://access.redhat.com/errata/RHSA-2024:3757 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2024:3754 - () https://access.redhat.com/errata/RHSA-2024:3754 - Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2270353 - () https://bugzilla.redhat.com/show_bug.cgi?id=2270353 - Issue Tracking, Mitigation, Vendor Advisory
References () https://www.freeipa.org/release-notes/4-12-1.html - () https://www.freeipa.org/release-notes/4-12-1.html - Release Notes
References () https://access.redhat.com/errata/RHSA-2024:3755 - () https://access.redhat.com/errata/RHSA-2024:3755 - Vendor Advisory
References () https://access.redhat.com/security/cve/CVE-2024-2698 - () https://access.redhat.com/security/cve/CVE-2024-2698 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2024:3759 - () https://access.redhat.com/errata/RHSA-2024:3759 - Vendor Advisory
First Time Redhat enterprise Linux Eus
Freeipa
Freeipa freeipa
Redhat enterprise Linux
Redhat
CWE CWE-284 CWE-863
CPE cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:9.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:a:freeipa:freeipa:4.12.0:*:*:*:*:*:*:*
cpe:2.3:a:freeipa:freeipa:*:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

16 Sep 2024, 20:15

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WT3JL7JQDIAFKKEFARWYES7GZNWGQNCI/', 'name': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WT3JL7JQDIAFKKEFARWYES7GZNWGQNCI/', 'tags': [], 'refsource': ''}

27 Jun 2024, 03:15

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WT3JL7JQDIAFKKEFARWYES7GZNWGQNCI/ -

12 Jun 2024, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-12 08:15

Updated : 2024-11-24 17:15


NVD link : CVE-2024-2698

Mitre link : CVE-2024-2698


JSON object : View

Products Affected

freeipa

  • freeipa

redhat

  • enterprise_linux_eus
  • enterprise_linux
CWE
CWE-863

Incorrect Authorization