Bug 1207474 (CVE-2022-4254) - VUL-0: CVE-2022-4254: sssd: libsss_certmap fails to sanitise certificate data used in LDAP filters
Summary: VUL-0: CVE-2022-4254: sssd: libsss_certmap fails to sanitise certificate data...
Status: RESOLVED FIXED
Alias: CVE-2022-4254
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/354912/
Whiteboard: CVSSv3.1:SUSE:CVE-2022-4254:8.3:(AV:N...
Keywords:
Depends on:
Blocks:
 
Reported: 2023-01-24 12:54 UTC by Robert Frohl
Modified: 2024-05-03 09:58 UTC (History)
3 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Robert Frohl 2023-01-24 12:54:30 UTC
rh#2149894

FreeIPA supports the Kerberos PKINIT protocol extension (RFC 4556). PKINIT enables a client to authenticate to the KDC using an X.509 certificate and the corresonding private key, rather than a passphrase or keytab. FreeIPA uses mapping rules to map a certificate presented during a PKINIT authentication request to the corresponding principal. The mapping filter is vulnerable to LDAP filter injection. The search result can be influenced by values in the certificate, which may be attacker controlled. In the most extreme case, an attacker could gain control of the admin account, leading to full domain takeover. 

FreeIPA is not vulnerable in its default configuration.

The problem is in libsss_certmap, which is part of SSSD. FreeIPA servers use this library in ipa_kdb Kerberos plugin implementation. 

The issue was introduced in SSSD 1.15.3 (when libsss_certmap was introduced) and resolved in SSSD 2.3.1.

References:
https://bugzilla.redhat.com/show_bug.cgi?id=2149894
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4254
Comment 4 Swamp Workflow Management 2023-01-27 20:20:10 UTC
SUSE-SU-2023:0200-1: An update that fixes one vulnerability is now available.

Category: security (important)
Bug References: 1207474
CVE References: CVE-2022-4254
JIRA References: 
Sources used:
SUSE OpenStack Cloud Crowbar 9 (src):    sssd-1.16.1-4.43.1
SUSE OpenStack Cloud 9 (src):    sssd-1.16.1-4.43.1
SUSE Linux Enterprise Server for SAP 12-SP4 (src):    sssd-1.16.1-4.43.1
SUSE Linux Enterprise Server 12-SP4-LTSS (src):    sssd-1.16.1-4.43.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 5 Swamp Workflow Management 2023-01-27 20:21:27 UTC
SUSE-SU-2023:0204-1: An update that fixes one vulnerability is now available.

Category: security (important)
Bug References: 1207474
CVE References: CVE-2022-4254
JIRA References: 
Sources used:
openSUSE Leap Micro 5.2 (src):    sssd-1.16.1-150300.23.37.1
SUSE Manager Server 4.2 (src):    sssd-1.16.1-150300.23.37.1
SUSE Manager Retail Branch Server 4.2 (src):    sssd-1.16.1-150300.23.37.1
SUSE Manager Proxy 4.2 (src):    sssd-1.16.1-150300.23.37.1
SUSE Linux Enterprise Server for SAP 15-SP3 (src):    sssd-1.16.1-150300.23.37.1
SUSE Linux Enterprise Server 15-SP3-LTSS (src):    sssd-1.16.1-150300.23.37.1
SUSE Linux Enterprise Realtime Extension 15-SP3 (src):    sssd-1.16.1-150300.23.37.1
SUSE Linux Enterprise Micro 5.2 (src):    sssd-1.16.1-150300.23.37.1
SUSE Linux Enterprise Micro 5.1 (src):    sssd-1.16.1-150300.23.37.1
SUSE Linux Enterprise High Performance Computing 15-SP3-LTSS (src):    sssd-1.16.1-150300.23.37.1
SUSE Linux Enterprise High Performance Computing 15-SP3-ESPOS (src):    sssd-1.16.1-150300.23.37.1
SUSE Enterprise Storage 7.1 (src):    sssd-1.16.1-150300.23.37.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 6 Swamp Workflow Management 2023-02-07 14:19:25 UTC
SUSE-SU-2023:0292-1: An update that fixes one vulnerability is now available.

Category: security (important)
Bug References: 1207474
CVE References: CVE-2022-4254
JIRA References: 
Sources used:
SUSE Linux Enterprise Server for SAP 15-SP1 (src):    sssd-1.16.1-150000.8.70.1
SUSE Linux Enterprise Server 15-SP1-LTSS (src):    sssd-1.16.1-150000.8.70.1
SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src):    sssd-1.16.1-150000.8.70.1
SUSE Enterprise Storage 6 (src):    sssd-1.16.1-150000.8.70.1
SUSE CaaS Platform 4.0 (src):    sssd-1.16.1-150000.8.70.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 7 Swamp Workflow Management 2023-02-07 17:22:34 UTC
SUSE-SU-2023:0301-1: An update that solves one vulnerability and has one errata is now available.

Category: security (important)
Bug References: 1203583,1207474
CVE References: CVE-2022-4254
JIRA References: 
Sources used:
SUSE Linux Enterprise Software Development Kit 12-SP5 (src):    sssd-1.16.1-7.49.1
SUSE Linux Enterprise Server 12-SP5 (src):    sssd-1.16.1-7.49.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 8 Swamp Workflow Management 2023-02-07 17:23:24 UTC
SUSE-SU-2023:0300-1: An update that fixes one vulnerability is now available.

Category: security (important)
Bug References: 1207474
CVE References: CVE-2022-4254
JIRA References: 
Sources used:
SUSE Linux Enterprise Server for SAP 15-SP2 (src):    sssd-1.16.1-150200.17.26.1
SUSE Linux Enterprise Server 15-SP2-LTSS (src):    sssd-1.16.1-150200.17.26.1
SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (src):    sssd-1.16.1-150200.17.26.1
SUSE Enterprise Storage 7 (src):    sssd-1.16.1-150200.17.26.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 9 Samuel Cabrero 2023-10-30 08:18:33 UTC
Reassign to security team to close it.
Comment 10 Robert Frohl 2024-05-03 09:58:57 UTC
done, closing