Severity
7.5HIGH
EPSS
0.7%
top 28.53%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 2
Latest updateJun 3

Description

An access control bypass vulnerability found in 389-ds-base. That mishandling of the filter that would yield incorrect results, but as that has progressed, can be determined that it actually is an access control bypass. This may allow any remote unauthenticated user to issue a filter that allows searching for database items they do not have access to, including but not limited to potentially userPassword hashes and other sensitive data.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages4 packages

Debian389-ds-base< 2.3.1-1+1
CVEListV5389-ds-base389-ds-base-2.0
NVDredhat/389_directory_server1.3.0.02.0.0
NVDredhat/directory_server11.0, 12.0+1

Also affects: Fedora 34, 35, 36, Enterprise Linux 8.0, 9.0

Patches

🔴Vulnerability Details

3
GHSA
GHSA-x847-vxvj-g6rj: An access control bypass vulnerability found in 389-ds-base2022-06-03
OSV
CVE-2022-1949: An access control bypass vulnerability found in 389-ds-base2022-06-02
CVEList
CVE-2022-1949: An access control bypass vulnerability found in 389-ds-base2022-06-01

📋Vendor Advisories

2
Red Hat
389-ds-base: access control bypass by query (filter in LDAP terms) optimiser2022-05-31
Debian
CVE-2022-1949: 389-ds-base - An access control bypass vulnerability found in 389-ds-base. That mishandling of...2022
CVE-2022-1949 (HIGH CVSS 7.5) | An access control bypass vulnerabil | cvebase.io