{ "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", "CVE_data_meta": { "ID": "CVE-2024-1481", "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", "value": "A flaw was found in FreeIPA. This issue may allow a remote attacker to craft a HTTP request with parameters that can be interpreted as command arguments to kinit on the FreeIPA server, which can lead to a denial of service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation", "cweId": "CWE-20" } ] } ] }, "affects": { "vendor": { "vendor_data": [ { "vendor_name": "Red Hat", "product": { "product_data": [ { "product_name": "Red Hat Enterprise Linux 8", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "versions": [ { "version": "8100020240307184541.6d180cd9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" } ], "defaultStatus": "affected" } }, { "version_value": "not down converted", "x_cve_json_5_version_data": { "versions": [ { "version": "8100020240307185118.fc00487d", "lessThan": "*", "versionType": "rpm", "status": "unaffected" } ], "defaultStatus": "affected" } } ] } }, { "product_name": "Red Hat Enterprise Linux 9", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "versions": [ { "version": "0:4.11.0-9.el9_4", "lessThan": "*", "versionType": "rpm", "status": "unaffected" } ], "defaultStatus": "affected" } } ] } }, { "product_name": "Red Hat Enterprise Linux 7", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "unknown" } } ] } } ] } } ] } }, "references": { "reference_data": [ { "url": "https://access.redhat.com/errata/RHSA-2024:2147", "refsource": "MISC", "name": "https://access.redhat.com/errata/RHSA-2024:2147" }, { "url": "https://access.redhat.com/errata/RHSA-2024:3044", "refsource": "MISC", "name": "https://access.redhat.com/errata/RHSA-2024:3044" }, { "url": "https://access.redhat.com/security/cve/CVE-2024-1481", "refsource": "MISC", "name": "https://access.redhat.com/security/cve/CVE-2024-1481" }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2262169", "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2262169" } ] }, "work_around": [ { "lang": "en", "value": "Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability." } ], "credits": [ { "lang": "en", "value": "Red Hat would like to thank Sukhov Mikhail (Angara Security) for reporting this issue." } ], "impact": { "cvss": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } ] } }