Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1475851 - (CVE-2017-11191) CVE-2017-11191 ipa: Session reuse to unlock the locked user
CVE-2017-11191 ipa: Session reuse to unlock the locked user
Status: CLOSED NOTABUG
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20170927,reported=2...
: Security
Depends On: 1497164
Blocks: 1475857
  Show dependency treegraph
 
Reported: 2017-07-27 09:24 EDT by Andrej Nemec
Modified: 2017-10-05 05:48 EDT (History)
13 users (show)

See Also:
Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2017-09-29 08:09:07 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Andrej Nemec 2017-07-27 09:24:33 EDT
A flaw was found in the way FreeIPA handled sessions. It was found that a user with a locked account could reuse his older session, from when the user's account was active, to unlock his account which got locked later on.
Comment 4 Pavel Vomacka 2017-07-28 03:03:40 EDT
Version: FreeIPA, version: 4.4.0-12 on RHEL 7.3

I tried to use two browsers for reproducing it. See the steps below.

Account lock due to failed log in attempts 
1. Chrome: Logged in as tuser
2. Firefox: Logged out
3. Firefox: 6x failed log in as tuser
4. Firefox: Try to log in with correct passwd to test that account is locked
5. Firefox: Log in is not possible
6. Chrome: (still active session from last login) Tries to click on Unlock in Action menu - it failed with internal server error (the same error is there for any other API calls to server) 

Account disabling:
1. Chrome: Logged in as tuser
2. Firefox: Logged in as admin
3. Firefox: Navigate to 'tuser' user details page
4. Firefox: Actions -> disable to disable the 'tuser' user
6. Chrome: (still active session from last login) Enable user in Actions on details page is grayed out so. Tries to change field value and click "Save"- it failed with internal server error (the same error is there for any other API calls to server) 

In case that those above are steps to reproduce, I'm not able to reproduce it. But still, I would rather wait for exact steps (and more information about env) from reporter to be sure that we don't miss anything.
Comment 6 Adam Mariš 2017-09-29 07:02:09 EDT
Created freeipa tracking bugs for this issue:

Affects: fedora-all [bug 1497164]
Comment 9 Dhiru Kholia 2017-10-05 05:48:55 EDT
Statement:

This security issue does not exist in IPA / FreeIPA. FreeIPA server correctly rejects the  HTTP request for "user_unlock" method with 401 Unauthorized HTTP code when the attacker tries to reuse an older browser session. Therefore, we do not consider this report as a valid security concern. We have submitted a request to MITRE to reject this CVE ID.

Note You need to log in before you can comment on or make changes to this bug.