The token authentication scheme in Dogtag CA can be bypassed with a Ldap injection. By passing the query string parameter sessionID=*, an attacker can authenticate with the existing session saved in Ldap directory server.
This is ready to unembargo from our side. Endi, please confirm if your team is able to view the tracker bugs and prepare Erratas? Thank you.
Fixed upstream: * master branch: https://github.com/dogtagpki/pki/commit/aa7161ba378caf5cf0471aafb679a842679c8388 * v11.5 branch: https://github.com/dogtagpki/pki/commit/54e5b3c5932ad634b5ddf5b1d4d88c9419d6f720
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2024:4051 https://access.redhat.com/errata/RHSA-2024:4051
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions Red Hat Enterprise Linux 8.4 Telecommunications Update Service Via RHSA-2024:4164 https://access.redhat.com/errata/RHSA-2024:4164
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:4165 https://access.redhat.com/errata/RHSA-2024:4165
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.8 Extended Update Support Via RHSA-2024:4179 https://access.redhat.com/errata/RHSA-2024:4179
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2024:4222 https://access.redhat.com/errata/RHSA-2024:4222
Created dogtag-pki tracking bugs for this issue: Affects: fedora-all [bug 2295804]
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:4367 https://access.redhat.com/errata/RHSA-2024:4367
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions Red Hat Enterprise Linux 8.6 Telecommunications Update Service Via RHSA-2024:4403 https://access.redhat.com/errata/RHSA-2024:4403
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions Via RHSA-2024:4413 https://access.redhat.com/errata/RHSA-2024:4413