First published: Tue Jul 02 2019(Updated: )
A flaw was found in IPA, all 4.6.x versions before 4.6.7, all 4.7.x versions before 4.7.4 and all 4.8.x versions before 4.8.3, in the way that FreeIPA's batch processing API logged operations. This included passing user passwords in clear text on FreeIPA masters. Batch processing of commands with passwords as arguments or options is not performed by default in FreeIPA but is possible by third-party components. An attacker having access to system logs on FreeIPA masters could use this flaw to produce log file content with passwords exposed.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/FreeIPA | <4.6.7 | 4.6.7 |
redhat/FreeIPA | <4.7.4 | 4.7.4 |
redhat/FreeIPA | <4.8.3 | 4.8.3 |
pip/ipa | >=4.8.0<4.8.3 | 4.8.3 |
pip/ipa | >=4.7.0<4.7.4 | 4.7.4 |
pip/ipa | >=4.6.0<4.6.7 | 4.6.7 |
pip/freeipa | >=4.8.0<4.8.3 | 4.8.3 |
pip/freeipa | >=4.7.0<4.7.4 | 4.7.4 |
pip/freeipa | >=4.6.0<4.6.7 | 4.6.7 |
Red Hat FreeIPA | >=4.6.0<4.6.7 | |
Red Hat FreeIPA | >=4.7.0<4.7.4 | |
Red Hat FreeIPA | >=4.8.0<4.8.3 | |
Red Hat Fedora | =30 | |
Red Hat Fedora | =31 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10195 is classified as a moderate severity vulnerability.
To fix CVE-2019-10195, upgrade FreeIPA to version 4.6.7, 4.7.4, or 4.8.3 or higher.
CVE-2019-10195 affects FreeIPA versions prior to 4.6.7, 4.7.4, and 4.8.3 across all distributions.
The impact of CVE-2019-10195 includes logging user passwords in clear text during the batch processing of commands.
Yes, CVE-2019-10195 can be exploited remotely if an attacker has access to the FreeIPA API.