CVE Vulnerabilities

CVE-2019-14826

Insufficient Session Expiration

Published: Sep 17, 2019 | Modified: Nov 21, 2024
CVSS 3.x
4.4
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
2.1 LOW
AV:L/AC:L/Au:N/C:P/I:N/A:N
RedHat/V2
RedHat/V3
1.8 LOW
CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

A flaw was found in FreeIPA versions 4.5.0 and later. Session cookies were retained in the cache after logout. An attacker could abuse this flaw if they obtain previously valid session cookies and can use this to gain access to the session.

Weakness

According to WASC, “Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization.”

Affected Software

NameVendorStart VersionEnd Version
FreeipaFreeipa4.5.0 (including)*
FreeipaUbuntubionic*
FreeipaUbuntudevel*
FreeipaUbuntudisco*
FreeipaUbuntueoan*
FreeipaUbuntuesm-apps/bionic*
FreeipaUbuntuesm-apps/focal*
FreeipaUbuntuesm-apps/jammy*
FreeipaUbuntuesm-apps/noble*
FreeipaUbuntufocal*
FreeipaUbuntugroovy*
FreeipaUbuntuhirsute*
FreeipaUbuntuimpish*
FreeipaUbuntujammy*
FreeipaUbuntukinetic*
FreeipaUbuntulunar*
FreeipaUbuntumantic*
FreeipaUbuntunoble*
FreeipaUbuntuoracular*
FreeipaUbuntuplucky*
FreeipaUbuntuquesting*
FreeipaUbuntutrusty*
FreeipaUbuntuupstream*

Potential Mitigations

References