A flaw was found in dogtag-pki and pki-core. The token authentication scheme can be bypassed with a LDAP injection. By passing the query string parameter sessionID=*, an attacker can authenticate with an existing session saved in the LDAP directory server, which may lead to escalation of privilege.
Metrics
Affected Vendors & Products
References
History
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 21 Nov 2024 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | ||
| Vendors & Products |
Redhat certificate System
|
|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: redhat
Published: 2024-06-11T19:30:25.613Z
Updated: 2025-09-12T19:51:30.772Z
Reserved: 2023-09-01T20:44:55.077Z
Link: CVE-2023-4727
Updated: 2024-08-02T07:38:00.502Z
Status : Awaiting Analysis
Published: 2024-06-11T20:15:09.733
Modified: 2024-11-21T08:35:50.450
Link: CVE-2023-4727