It was found that a mock CMC authentication plugin with a hardcoded secret was accidentally enabled by default in the pki-core package before 10.6.4. An attacker could potentially use this flaw to bypass the regular authentication process and trick the CA server into issuing certificates.
This weakness has been deprecated because it covered redundant concepts already described in CWE-287.
The product contains hard-coded credentials, such as a password or cryptographic key.
Link | Tags |
---|---|
https://github.com/dogtagpki/pki/commit/876d13c6d20e7e1235b9 | third party advisory patch |
https://access.redhat.com/errata/RHSA-2017:2335 | third party advisory vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7537 | issue tracking patch exploit third party advisory |