A flaw was found in FreeIPA versions 4.5.0 and later. Session cookies were retained in the cache after logout. An attacker could abuse this flaw if they obtain previously valid session cookies and can use this to gain access to the session.
According to WASC, “Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization.”
Name | Vendor | Start Version | End Version |
---|---|---|---|
Freeipa | Freeipa | 4.5.0 (including) | * |
Freeipa | Ubuntu | bionic | * |
Freeipa | Ubuntu | devel | * |
Freeipa | Ubuntu | disco | * |
Freeipa | Ubuntu | eoan | * |
Freeipa | Ubuntu | esm-apps/bionic | * |
Freeipa | Ubuntu | esm-apps/focal | * |
Freeipa | Ubuntu | esm-apps/jammy | * |
Freeipa | Ubuntu | esm-apps/noble | * |
Freeipa | Ubuntu | focal | * |
Freeipa | Ubuntu | groovy | * |
Freeipa | Ubuntu | hirsute | * |
Freeipa | Ubuntu | impish | * |
Freeipa | Ubuntu | jammy | * |
Freeipa | Ubuntu | kinetic | * |
Freeipa | Ubuntu | lunar | * |
Freeipa | Ubuntu | mantic | * |
Freeipa | Ubuntu | noble | * |
Freeipa | Ubuntu | oracular | * |
Freeipa | Ubuntu | trusty | * |
Freeipa | Ubuntu | upstream | * |