Vulnerability Description
A vulnerability was found in FreeIPA in how the initial implementation of MS-SFU by MIT Kerberos was missing a condition for granting the "forwardable" flag on S4U2Self tickets. Fixing this mistake required adding a special case for the check_allowed_to_delegate() function: If the target service argument is NULL, then it means the KDC is probing for general constrained delegation rules and not checking a specific S4U2Proxy request. In FreeIPA 4.11.0, the behavior of ipadb_match_acl() was modified to match the changes from upstream MIT Kerberos 1.20. However, a mistake resulting in this mechanism applies in cases where the target service argument is set AND where it is unset. This results in S4U2Proxy requests being accepted regardless of whether or not there is a matching service delegation rule.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Freeipa | Freeipa | >= 4.11.0, < 4.11.2 |
| Redhat | Enterprise Linux | 6.0 |
| Redhat | Enterprise Linux Eus | 8.8 |
Related Weaknesses (CWE)
References
- https://access.redhat.com/errata/RHSA-2024:3754Vendor Advisory
- https://access.redhat.com/errata/RHSA-2024:3755Vendor Advisory
- https://access.redhat.com/errata/RHSA-2024:3757Vendor Advisory
- https://access.redhat.com/errata/RHSA-2024:3759Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2024-2698Vendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2270353Issue TrackingMitigationVendor Advisory
- https://www.freeipa.org/release-notes/4-12-1.htmlRelease Notes
- https://access.redhat.com/errata/RHSA-2024:3754Vendor Advisory
- https://access.redhat.com/errata/RHSA-2024:3755Vendor Advisory
- https://access.redhat.com/errata/RHSA-2024:3757Vendor Advisory
- https://access.redhat.com/errata/RHSA-2024:3759Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2024-2698Vendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2270353Issue TrackingMitigationVendor Advisory
- https://lists.fedoraproject.org/archives/list/[email protected]
- https://www.freeipa.org/release-notes/4-12-1.htmlRelease Notes
FAQ
What is CVE-2024-2698?
CVE-2024-2698 is a vulnerability with a CVSS score of 8.8 (HIGH). A vulnerability was found in FreeIPA in how the initial implementation of MS-SFU by MIT Kerberos was missing a condition for granting the "forwardable" flag on S4U2Self tickets. Fixing this mistake re...
How severe is CVE-2024-2698?
CVE-2024-2698 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-2698?
Check the references section above for vendor advisories and patch information. Affected products include: Freeipa Freeipa, Redhat Enterprise Linux, Redhat Enterprise Linux Eus.