| Revision Date: | 2018-09-18 | Version: | 1 | | Title: | CVE-2012-5631 on Ubuntu 18.04 LTS (bionic) - untriaged. | | Description: | In IPA version 3.0 the session cookie optimization was added to the IPA command line client (/usr/bin/ipa) which uses XMLRPC to connect to the IPA server and perform the same operations available in the browser based web UI of IPA. Unfortunately the command line client failed to observe the same rules for cookie security that browsers implement. Specifically it failed to check it was sending the session id in the cookie to the same URL the session id was received on a secure transport connection.
| | Family: | unix | Class: | vulnerability | | Status: | | Reference(s): | CVE-2012-5631
| | Platform(s): | Ubuntu 18.04 LTS
| Product(s): | | | Definition Synopsis | | Ubuntu 18.04 LTS (bionic) is installed. AND NOT While related to the CVE in some way, the 'freeipa' package in bionic is not affected.
|
|