FreeIPA 4.x with API version 2.213 allows a remote authenticated users to bypass intended account-locking restrictions via an unlock action with an old session ID (for the same user account) that had been created for an earlier session. NOTE: Vendor states that issue does not exist in product and does not recognize this report as a valid security concern
                
            References
                    | Link | Resource | 
|---|---|
| http://packetstormsecurity.com/files/143532/FreeIPA-2.213-Session-Hijacking.html | Third Party Advisory VDB Entry | 
| http://packetstormsecurity.com/files/143532/FreeIPA-2.213-Session-Hijacking.html | Third Party Advisory VDB Entry | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 03:07
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://packetstormsecurity.com/files/143532/FreeIPA-2.213-Session-Hijacking.html - Third Party Advisory, VDB Entry | 
07 Nov 2023, 02:38
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | FreeIPA 4.x with API version 2.213 allows a remote authenticated users to bypass intended account-locking restrictions via an unlock action with an old session ID (for the same user account) that had been created for an earlier session. NOTE: Vendor states that issue does not exist in product and does not recognize this report as a valid security concern | 
Information
                Published : 2017-09-28 01:29
Updated : 2025-04-20 01:37
NVD link : CVE-2017-11191
Mitre link : CVE-2017-11191
CVE.ORG link : CVE-2017-11191
JSON object : View
Products Affected
                freeipa
- freeipa
CWE
                
                    
                        
                        CWE-384
                        
            Session Fixation
