CVE Vulnerabilities

CVE-2019-14826

Insufficient Session Expiration

Published: Sep 17, 2019 | Modified: Oct 09, 2019
CVSS 3.x
4.4
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
2.1 LOW
AV:L/AC:L/Au:N/C:P/I:N/A:N
RedHat/V2
RedHat/V3
1.8 LOW
CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N
Ubuntu
MEDIUM

A flaw was found in FreeIPA versions 4.5.0 and later. Session cookies were retained in the cache after logout. An attacker could abuse this flaw if they obtain previously valid session cookies and can use this to gain access to the session.

Weakness

According to WASC, “Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization.”

Affected Software

Name Vendor Start Version End Version
Freeipa Freeipa 4.5.0 (including) *
Freeipa Ubuntu bionic *
Freeipa Ubuntu devel *
Freeipa Ubuntu disco *
Freeipa Ubuntu eoan *
Freeipa Ubuntu esm-apps/bionic *
Freeipa Ubuntu esm-apps/focal *
Freeipa Ubuntu esm-apps/jammy *
Freeipa Ubuntu esm-apps/noble *
Freeipa Ubuntu focal *
Freeipa Ubuntu groovy *
Freeipa Ubuntu hirsute *
Freeipa Ubuntu impish *
Freeipa Ubuntu jammy *
Freeipa Ubuntu kinetic *
Freeipa Ubuntu lunar *
Freeipa Ubuntu mantic *
Freeipa Ubuntu noble *
Freeipa Ubuntu oracular *
Freeipa Ubuntu trusty *
Freeipa Ubuntu upstream *

Potential Mitigations

References