First published: Mon Jun 27 2022(Updated: )
LDAP Account Manager (LAM) is a webfrontend for managing entries (e.g. users, groups, DHCP settings) stored in an LDAP directory. In versions prior to 8.0 the session files include the LDAP user name and password in clear text if the PHP OpenSSL extension is not installed or encryption is disabled by configuration. This issue has been fixed in version 8.0. Users unable to upgrade should install the PHP OpenSSL extension and make sure session encryption is enabled in LAM main configuration.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/ldap-account-manager | 8.0.1-0+deb11u1 8.3-1 | |
Internet Explorer | <8.0 | |
Debian GNU/Linux | =11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-31085 has a severity rating that indicates a significant risk due to the exposure of sensitive information.
To fix CVE-2022-31085, upgrade to versions 8.0.1-0+deb11u1 or 8.3-1 of the ldap-account-manager package.
CVE-2022-31085 affects LDAP Account Manager versions prior to 8.0 which may expose LDAP usernames and passwords in clear text.
Users of LDAP Account Manager versions prior to 8.0 without the PHP OpenSSL extension installed are affected by CVE-2022-31085.
A temporary workaround for CVE-2022-31085 is to ensure that the PHP OpenSSL extension is installed, but updating is the recommended solution.