From 4a47583e0e3f8fb6eb6aa9b9c1f03d6364d0f635 Mon Sep 17 00:00:00 2001 From: Lindacornwall <55097368+Lindacornwall@users.noreply.github.com> Date: Tue, 14 Nov 2023 15:12:44 +0000 Subject: [PATCH] Update Advisory-EGI-SVG-2023-53.md --- 2023/Advisory-EGI-SVG-2023-53.md | 69 ++++++++++++++++++++++++++++++-- 1 file changed, 65 insertions(+), 4 deletions(-) diff --git a/2023/Advisory-EGI-SVG-2023-53.md b/2023/Advisory-EGI-SVG-2023-53.md index a75cac2..553425f 100644 --- a/2023/Advisory-EGI-SVG-2023-53.md +++ b/2023/Advisory-EGI-SVG-2023-53.md @@ -1,11 +1,72 @@ --- -title: Advisory- +--- +title: Advisory-EGI-SVG-2023-53 permalink: /Advisory-EGI-SVG-2023-53 + +published: false --- ## Advisory-EGI-SVG-2023-53 -``` -Placeholder - this advisory is not public yet. +# 'ADVISORY' [TLP:WHITE] 'HIGH' Risk INDIGO-IAM Vulnerability [EGI-SVG-2023-53] + +Date: 2023-09-21 +Updated 2023-11-14 + +A HIGH risk vulnerability has been found concerning +INDIGO-IAM where a user may be granted rights to which they are not +entitled. Effectively this is a privilege escalation vulnerability. +This is fixed in INDIGO-IAM version 1.8.1p2 and 1.8.2p2. + +## IDs AND CVSS SCORE + +EGI SVG ID : EGI-SVG-2023-53 + +CVE ID : N/A + +## ACTIONS REQUIRED/RECOMMENDED + +Sites running INDIGO-IAM servers are recommended to update as soon as +possible, from the github distribution in the reference below. [R 1] + +## MORE INFORMATION + +Documentation on INDIGO-IAM is available at [R 2], [R 3] + +There is also the possibility that an unauthorized user may gain +authorization by tricking an authorized user to approve a request. + +## STATUS OF THIS ADVISORY + +_TLP:WHITE information - Unlimited distribution_ + + + +Minor updates may be made without re-distribution to the sites. + +## CONTACT AND OTHER INFORMATION ON SVG + +Comments or questions should be sent to + svg-rat at mailman.egi.eu + +Vulnerabilities relevant for EGI can be reported at + report-vulnerability at egi.eu + +(see [R 99] for further details, and other information on SVG) + +## REFERENCES + +- [R 1] + +- [R 2] + +- [R 3] + + +- [R 99] + +## CREDITS + +This vulnerability discovered by Ahmad Alkhansa. +The detailed description of the vulnerability was drafted by Roberta Miccoli. -```