Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-4727

Опубликовано: 11 июн. 2024
Источник: debian

Описание

A flaw was found in dogtag-pki and pki-core. The token authentication scheme can be bypassed with a LDAP injection. By passing the query string parameter sessionID=*, an attacker can authenticate with an existing session saved in the LDAP directory server, which may lead to escalation of privilege.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
dogtag-pkiremovedpackage
dogtag-pkino-dsabullseyepackage

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=2232218

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 1 года назад

A flaw was found in dogtag-pki and pki-core. The token authentication scheme can be bypassed with a LDAP injection. By passing the query string parameter sessionID=*, an attacker can authenticate with an existing session saved in the LDAP directory server, which may lead to escalation of privilege.

CVSS3: 7.5
redhat
около 1 года назад

A flaw was found in dogtag-pki and pki-core. The token authentication scheme can be bypassed with a LDAP injection. By passing the query string parameter sessionID=*, an attacker can authenticate with an existing session saved in the LDAP directory server, which may lead to escalation of privilege.

CVSS3: 7.5
nvd
около 1 года назад

A flaw was found in dogtag-pki and pki-core. The token authentication scheme can be bypassed with a LDAP injection. By passing the query string parameter sessionID=*, an attacker can authenticate with an existing session saved in the LDAP directory server, which may lead to escalation of privilege.

CVSS3: 7.5
redos
5 месяцев назад

Уязвимость pki-server

rocky
12 месяцев назад

Important: pki-core security update