First published: Tue May 31 2022(Updated: )
An access control bypass vulnerability found in 389-ds-base. That mishandling of the filter that would yield incorrect results, but as that has progressed, can be determined that it actually is an access control bypass. This may allow any remote unauthenticated user to issue a filter that allows searching for database items they do not have access to, including but not limited to potentially userPassword hashes and other sensitive data.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Port389 389-ds-base | >=1.3.0.0<=2.0.0 | |
Redhat Directory Server | =11.0 | |
Redhat Directory Server | =12.0 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =9.0 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
Redhat 389 Directory Server | >=1.3.0.0<=2.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-1949 is an access control bypass vulnerability found in 389-ds-base.
CVE-2022-1949 affects Port389 389-ds-base, Redhat Directory Server, Redhat Enterprise Linux, and Fedoraproject Fedora.
The severity of CVE-2022-1949 is high, with a CVSS score of 7.5.
An attacker can exploit CVE-2022-1949 by sending a crafted filter to bypass access controls.
Yes, you can find more information about CVE-2022-1949 at the following references: [link1], [link2], [link3].