Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3483-6grv-x2wh

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The SASL authentication functionality in 389 Directory Server before 1.2.11.26 allows remote authenticated users to connect as an arbitrary user and gain privileges via the authzid parameter in a SASL/GSSAPI bind.

The SASL authentication functionality in 389 Directory Server before 1.2.11.26 allows remote authenticated users to connect as an arbitrary user and gain privileges via the authzid parameter in a SASL/GSSAPI bind.

EPSS

Процентиль: 68%
0.00573
Низкий

Дефекты

CWE-287

Связанные уязвимости

ubuntu
больше 11 лет назад

The SASL authentication functionality in 389 Directory Server before 1.2.11.26 allows remote authenticated users to connect as an arbitrary user and gain privileges via the authzid parameter in a SASL/GSSAPI bind.

redhat
больше 11 лет назад

The SASL authentication functionality in 389 Directory Server before 1.2.11.26 allows remote authenticated users to connect as an arbitrary user and gain privileges via the authzid parameter in a SASL/GSSAPI bind.

nvd
больше 11 лет назад

The SASL authentication functionality in 389 Directory Server before 1.2.11.26 allows remote authenticated users to connect as an arbitrary user and gain privileges via the authzid parameter in a SASL/GSSAPI bind.

debian
больше 11 лет назад

The SASL authentication functionality in 389 Directory Server before 1 ...

oracle-oval
больше 11 лет назад

ELSA-2014-0292: 389-ds-base security update (IMPORTANT)

EPSS

Процентиль: 68%
0.00573
Низкий

Дефекты

CWE-287