Vulnerability Description
A flaw was found in dogtag-pki and pki-core. The token authentication scheme can be bypassed with a LDAP injection. By passing the query string parameter sessionID=*, an attacker can authenticate with an existing session saved in the LDAP directory server, which may lead to escalation of privilege.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://access.redhat.com/errata/RHSA-2024:4051
- https://access.redhat.com/errata/RHSA-2024:4070
- https://access.redhat.com/errata/RHSA-2024:4164
- https://access.redhat.com/errata/RHSA-2024:4165
- https://access.redhat.com/errata/RHSA-2024:4179
- https://access.redhat.com/errata/RHSA-2024:4222
- https://access.redhat.com/errata/RHSA-2024:4367
- https://access.redhat.com/errata/RHSA-2024:4403
- https://access.redhat.com/errata/RHSA-2024:4413
- https://access.redhat.com/security/cve/CVE-2023-4727
- https://bugzilla.redhat.com/show_bug.cgi?id=2232218
- https://access.redhat.com/errata/RHSA-2024:4051
- https://access.redhat.com/errata/RHSA-2024:4070
- https://access.redhat.com/errata/RHSA-2024:4164
- https://access.redhat.com/errata/RHSA-2024:4165
FAQ
What is CVE-2023-4727?
CVE-2023-4727 is a vulnerability with a CVSS score of 7.5 (HIGH). A flaw was found in dogtag-pki and pki-core. The token authentication scheme can be bypassed with a LDAP injection. By passing the query string parameter sessionID=*, an attacker can authenticate with...
How severe is CVE-2023-4727?
CVE-2023-4727 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-4727?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.