CVE-2022-2393 – pki-core: When using the caServerKeygen_DirUserCert profile, user can get certificates for other UIDs by entering name in Subject field
https://notcve.org/view.php?id=CVE-2022-2393
A flaw was found in pki-core, which could allow a user to get a certificate for another user identity when directory-based authentication is enabled. This flaw allows an authenticated attacker on the adjacent network to impersonate another user within the scope of the domain, but they would not be able to decrypt message content. Se ha encontrado un fallo en pki-core, que podría permitir a un usuario conseguir un certificado para otra identidad de usuario cuando la autenticación basada en el directorio está habilitada. Este fallo permite a un atacante autenticado en la red adyacente hacerse pasar por otro usuario dentro del ámbito del dominio, pero no podría descifrar el contenido de los mensajes • https://bugzilla.redhat.com/show_bug.cgi?id=2101046 https://access.redhat.com/security/cve/CVE-2022-2393 • CWE-285: Improper Authorization CWE-287: Improper Authentication •
CVE-2020-1696 – pki-core: Stored XSS in TPS profile creation
https://notcve.org/view.php?id=CVE-2020-1696
A flaw was found in the all pki-core 10.x.x versions, where Token Processing Service (TPS) where it did not properly sanitize Profile IDs, enabling a Stored Cross-Site Scripting (XSS) vulnerability when the profile ID is printed. An attacker with sufficient permissions could trick an authenticated victim into executing a specially crafted Javascript code. Se detectó un fallo en todas las versiones de pki-core 10.x.x, donde Token Processing Service (TPS) no saneaba apropiadamente los ID de perfil, permitiendo una vulnerabilidad de tipo Cross-Site Scripting (XSS) Almacenado cuando se imprime el ID de perfil. Un atacante con permisos suficientes podría engañar a una víctima autenticada para que ejecute un código Javascript especialmente diseñado. A flaw was found in the pki-core's Token Processing Service (TPS) where it did not properly sanitize Profile IDs, enabling a Stored Cross-Site Scripting (XSS) vulnerability when the profile ID is printed. • https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1696 https://access.redhat.com/security/cve/CVE-2020-1696 https://bugzilla.redhat.com/show_bug.cgi?id=1780707 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2013-1885 – System: pki-tps XSS flaw
https://notcve.org/view.php?id=CVE-2013-1885
Multiple cross-site scripting (XSS) vulnerabilities in the token processing system (pki-tps) in Red Hat Certificate System (RHCS) 8.1 and possibly Dogtag Certificate System 9 and 10 allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO to (1) tus/ or (2) tus/tus/. Múltiples vulnerabilidades cross-site scripting (XSS) en el sistema de procesamiento de tokens (pki-tps) en Red Hat Certificate System (RHCS) 8.1 y posiblemente Dogtag Certificate System 9 y 10 permite a atacantes remotos inyectar scripts web o HTML arbitrarios a través del PATH_INFO a (1) tus/ o (2) tus/tus/. • http://osvdb.org/93626 http://osvdb.org/93627 http://rhn.redhat.com/errata/RHSA-2013-0856.html http://www.securitytracker.com/id/1029685 https://bugzilla.redhat.com/show_bug.cgi?id=923039 https://exchange.xforce.ibmcloud.com/vulnerabilities/84477 https://access.redhat.com/security/cve/CVE-2013-1885 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2013-1886 – System: pki-tps format string injection
https://notcve.org/view.php?id=CVE-2013-1886
Format string vulnerability in the token processing system (pki-tps) in Red Hat Certificate System (RHCS) 8.1 and possibly Dogtag Certificate System 9 and 10 allows remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in unspecified vectors, related to viewing certificates. Vulnerabilidad de formato de cadena de texto en el sistema de procesamiento de tokens (pki-tps) en Red Hat Certificate System (RHCS) 8.1 y posiblemente Dogtag Certificate Systsem 9 y 10 permite a usuarios autenticados remotamente causar denegación de servicio (caída) y posiblemente ejecutar código arbitrario a través de especificadores de formato de cadena de texto en vectores no especificados, relacionados con la visualización de certificados. • http://osvdb.org/93613 http://rhn.redhat.com/errata/RHSA-2013-0856.html http://www.securityfocus.com/bid/60085 http://www.securitytracker.com/id/1029685 https://bugzilla.redhat.com/show_bug.cgi?id=924870 https://access.redhat.com/security/cve/CVE-2013-1886 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-134: Use of Externally-Controlled Format String •