Bug 1475851 (CVE-2017-11191) - CVE-2017-11191 ipa: Session reuse to unlock the locked user
Summary: CVE-2017-11191 ipa: Session reuse to unlock the locked user
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2017-11191
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1497164
Blocks: 1475857
TreeView+ depends on / blocked
 
Reported: 2017-07-27 13:24 UTC by Andrej Nemec
Modified: 2021-02-17 01:48 UTC (History)
13 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2017-09-29 12:09:07 UTC
Embargoed:


Attachments (Terms of Use)

Description Andrej Nemec 2017-07-27 13:24:33 UTC
A flaw was found in the way FreeIPA handled sessions. It was found that a user with a locked account could reuse his older session, from when the user's account was active, to unlock his account which got locked later on.

Comment 4 Pavel Vomacka 2017-07-28 07:03:40 UTC
Version: FreeIPA, version: 4.4.0-12 on RHEL 7.3

I tried to use two browsers for reproducing it. See the steps below.

Account lock due to failed log in attempts 
1. Chrome: Logged in as tuser
2. Firefox: Logged out
3. Firefox: 6x failed log in as tuser
4. Firefox: Try to log in with correct passwd to test that account is locked
5. Firefox: Log in is not possible
6. Chrome: (still active session from last login) Tries to click on Unlock in Action menu - it failed with internal server error (the same error is there for any other API calls to server) 

Account disabling:
1. Chrome: Logged in as tuser
2. Firefox: Logged in as admin
3. Firefox: Navigate to 'tuser' user details page
4. Firefox: Actions -> disable to disable the 'tuser' user
6. Chrome: (still active session from last login) Enable user in Actions on details page is grayed out so. Tries to change field value and click "Save"- it failed with internal server error (the same error is there for any other API calls to server) 

In case that those above are steps to reproduce, I'm not able to reproduce it. But still, I would rather wait for exact steps (and more information about env) from reporter to be sure that we don't miss anything.

Comment 6 Adam Mariš 2017-09-29 11:02:09 UTC
Created freeipa tracking bugs for this issue:

Affects: fedora-all [bug 1497164]

Comment 9 Dhiru Kholia 2017-10-05 09:48:55 UTC
Statement:

This security issue does not exist in IPA / FreeIPA. FreeIPA server correctly rejects the  HTTP request for "user_unlock" method with 401 Unauthorized HTTP code when the attacker tries to reuse an older browser session. Therefore, we do not consider this report as a valid security concern. We have submitted a request to MITRE to reject this CVE ID.


Note You need to log in before you can comment on or make changes to this bug.