First published: Wed Jul 02 2014(Updated: )
The cherokee_validator_ldap_check function in validator_ldap.c in Cherokee 1.2.103 and earlier, when LDAP is used, does not properly consider unauthenticated-bind semantics, which allows remote attackers to bypass authentication via an empty password.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Fedora | =20 | |
Red Hat Fedora | =21 | |
Red Hat Fedora | =22 | |
Mageia | =4 | |
Cherokee Web Server | <=1.2.103 | |
Cherokee Web Server | =1.2.2 | |
Cherokee Web Server | =1.2.98 | |
Cherokee Web Server | =1.2.99 | |
Cherokee Web Server | =1.2.101 | |
Cherokee Web Server | =1.2.102 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-4668 has a medium severity rating as it allows remote attackers to bypass authentication.
To fix CVE-2014-4668, update Cherokee to version 1.2.104 or later.
Cherokee versions up to and including 1.2.103 are affected by CVE-2014-4668.
CVE-2014-4668 affects systems running Fedora versions 20, 21, 22, and Mageia version 4 with vulnerable Cherokee software.
Yes, CVE-2014-4668 can be exploited to gain unauthorized access to systems using vulnerable LDAP configurations.