CVE-2019-11187Improper Authentication in Gosa

Severity
9.8CRITICALNVD
OSV6.1
EPSS
0.4%
top 40.83%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 15
Latest updateMay 24

Description

Incorrect Access Control in the LDAP class of GONICUS GOsa through 2019-04-11 allows an attacker to log into any account with a username containing the case-insensitive substring "success" when an arbitrary password is provided.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages6 packages

NVDgonicus/gosa2019-04-11
debiandebian/gosa< fusiondirectory 1.2.3-5 (bullseye)
Debiangosa_project/gosa< 2.7.4+reloaded3-9+3
Ubuntugosa_project/gosa< 2.7.4+reloaded2-9ubuntu1.1
debiandebian/fusiondirectory< fusiondirectory 1.2.3-5 (bullseye)

Also affects: Debian Linux 8.0

Patches

🔴Vulnerability Details

3
GHSA
GHSA-9f66-x3qx-v4cg: Incorrect Access Control in the LDAP class of GONICUS GOsa through 2019-04-11 allows an attacker to log into any account with a username containing th2022-05-24
OSV
gosa vulnerabilities2020-10-28
OSV
CVE-2019-11187: Incorrect Access Control in the LDAP class of GONICUS GOsa through 2019-04-11 allows an attacker to log into any account with a username containing th2019-08-15

📋Vendor Advisories

2
Ubuntu
GOsa vulnerabilities2020-10-28
Debian
CVE-2019-11187: fusiondirectory - Incorrect Access Control in the LDAP class of GONICUS GOsa through 2019-04-11 al...2019