Severity
8.8HIGH
EPSS
0.4%
top 36.48%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 27
Latest updateMay 24

Description

It was found that sssd's sysdb_search_user_by_upn_res() function before 1.16.0 did not sanitize requests when querying its local cache and was vulnerable to injection. In a centralized login environment, if a password hash was locally cached for a given user, an authenticated attacker could use this flaw to retrieve it.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:NExploitability: 2.8 | Impact: 1.4

Affected Packages6 packages

NVDfedoraproject/sssd< 1.16.0
Debiansssd< 1.15.3-2+3
CVEListV5sssd/sssd1.16.0

Also affects: Enterprise Linux 7.4, 7.5

Patches

🔴Vulnerability Details

3
GHSA
GHSA-w83x-jcpq-6cr7: It was found that sssd's sysdb_search_user_by_upn_res() function before 12022-05-24
OSV
CVE-2017-12173: It was found that sssd's sysdb_search_user_by_upn_res() function before 12018-07-27
CVEList
CVE-2017-12173: It was found that sssd's sysdb_search_user_by_upn_res() function before 12018-07-27

📋Vendor Advisories

3
Ubuntu
SSSD vulnerability2018-01-10
Red Hat
sssd: unsanitized input when searching in local cache database2017-10-03
Debian
CVE-2017-12173: sssd - It was found that sssd's sysdb_search_user_by_upn_res() function before 1.16.0 d...2017

💬Community

2
Bugzilla
CVE-2017-12173 sssd: unsanitized input when searching in local cache database [fedora-all]2017-10-06
Bugzilla
CVE-2017-12173 sssd: unsanitized input when searching in local cache database2017-10-03
CVE-2017-12173 (HIGH CVSS 8.8) | It was found that sssd's sysdb_sear | cvebase.io