Bug 1819261 - freeipa: Exposure of DNS via system network configuration discovery
Summary: freeipa: Exposure of DNS via system network configuration discovery
Keywords:
Status: CLOSED NOTABUG
Alias: None
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 1819273
TreeView+ depends on / blocked
 
Reported: 2020-03-31 15:14 UTC by Pedro Sampaio
Modified: 2020-07-13 17:26 UTC (History)
11 users (show)

Fixed In Version: freeipa release-2-2-0
Doc Type: No Doc Update
Doc Text:
Clone Of:
Environment:
Last Closed: 2020-03-31 16:25:32 UTC


Attachments (Terms of Use)

Description Pedro Sampaio 2020-03-31 15:14:17 UTC
In FreeIPA, alpha-1-9-0 to rc_1-2-1-90 there is a public exposure of DNS
records to anyone who has access to the LDAP server (System Network Configuration Discovery which later
can serve an attacker for lateral movement).

Upstream patch:

https://github.com/freeipa/freeipa/commit/df13cdcb974e9f8b161be35fcef9651c2ffe0b5e

Comment 2 Cedric Buissart 2020-03-31 16:25:32 UTC
Thank you for the report.
This looks like a potential vulnerability. However, since no released version (only early alpha) were affected, none of which are supported, it is currently not believed that a CVE should be assigned to this.


Note You need to log in before you can comment on or make changes to this bug.