The client in FreeIPA 2.x and 3.x before 3.1.2 does not properly obtain the Certification Authority (CA) certificate from the server, which allows man-in-the-middle attackers to spoof a join procedure via a crafted certificate.
"https://github.com/pypa/advisory-database/blob/main/vulns/freeipa/PYSEC-2013-36.yaml"