Bug 1819261

Summary: freeipa: Exposure of DNS via system network configuration discovery
Product: [Other] Security Response Reporter: Pedro Sampaio <psampaio>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: abokovoy, fdc, frenaud, ipa-maint, jcholast, jhrozek, pvoborni, rcritten, ssorce, tscherf, twoerner
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: freeipa release-2-2-0 Doc Type: No Doc Update
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2020-03-31 16:25:32 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1819273    

Description Pedro Sampaio 2020-03-31 15:14:17 UTC
In FreeIPA, alpha-1-9-0 to rc_1-2-1-90 there is a public exposure of DNS
records to anyone who has access to the LDAP server (System Network Configuration Discovery which later
can serve an attacker for lateral movement).

Upstream patch:

https://github.com/freeipa/freeipa/commit/df13cdcb974e9f8b161be35fcef9651c2ffe0b5e

Comment 2 Cedric Buissart 2020-03-31 16:25:32 UTC
Thank you for the report.
This looks like a potential vulnerability. However, since no released version (only early alpha) were affected, none of which are supported, it is currently not believed that a CVE should be assigned to this.