Описание
It was found that sssd's sysdb_search_user_by_upn_res() function before 1.16.0 did not sanitize requests when querying its local cache and was vulnerable to injection. In a centralized login environment, if a password hash was locally cached for a given user, an authenticated attacker could use this flaw to retrieve it.
Ссылки
- Vendor Advisory
- Vendor Advisory
- Issue TrackingPatchVendor Advisory
- Vendor Advisory
- Vendor Advisory
- Issue TrackingPatchVendor Advisory
Уязвимые конфигурации
Одно из
EPSS
4.3 Medium
CVSS3
8.8 High
CVSS3
4 Medium
CVSS2
Дефекты
Связанные уязвимости
It was found that sssd's sysdb_search_user_by_upn_res() function before 1.16.0 did not sanitize requests when querying its local cache and was vulnerable to injection. In a centralized login environment, if a password hash was locally cached for a given user, an authenticated attacker could use this flaw to retrieve it.
It was found that sssd's sysdb_search_user_by_upn_res() function before 1.16.0 did not sanitize requests when querying its local cache and was vulnerable to injection. In a centralized login environment, if a password hash was locally cached for a given user, an authenticated attacker could use this flaw to retrieve it.
It was found that sssd's sysdb_search_user_by_upn_res() function befor ...
EPSS
4.3 Medium
CVSS3
8.8 High
CVSS3
4 Medium
CVSS2