7.5
CWE
284
Advisory Published
CVE Published
Updated

CVE-2015-1854

First published: Tue Apr 07 2015(Updated: )

An access control bypass flaw was found in modrdn. In particular if a user has a rdn like uid=username, then the user can change its own rdn to any value that is a superstring of the current name bypassing access control. This issue could be reproduced by the following: ldapmodrnd -Y GSSAPI -r uid=testuser,cn=users,cn=accounts,dc=test,dc=ipa uid=testuser_extended_without_permission The above succeeds and renames the user. No authentication whatsoever is necessary. An anonymous user can completely hose a server (if not worse) by just renaming any entry it pleases. If ACIs are employed to hide entries and those entries are targeted by name then it is also possible to reveal those contents by renaming the entry and falling off the ACI protection. Acknowledgements: This issue was discovered by Simo Sorce of Red Hat.

Credit: secalert@redhat.com

Affected SoftwareAffected VersionHow to fix
Fedoraproject 389 Directory Server<=1.3.3.9
Fedoraproject Fedora=22
Debian Debian Linux=8.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203