First published: Tue Sep 17 2019(Updated: )
A flaw was found in FreeIPA versions 4.5.0 and later. Session cookies were retained in the cache after logout. An attacker could abuse this flaw if they obtain previously valid session cookies and can use this to gain access to the session.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat FreeIPA | >=4.5.0 | |
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-14826 is considered a high severity vulnerability due to the potential for session hijacking.
To fix CVE-2019-14826, upgrade FreeIPA to the latest version that addresses this vulnerability.
CVE-2019-14826 affects FreeIPA versions 4.5.0 and later.
The primary issue with CVE-2019-14826 is session cookies being retained in the cache after logout, allowing unauthorized access.
Yes, CVE-2019-14826 can be exploited remotely if an attacker obtains previously valid session cookies.