cve/2021/CVE-2021-3825.md

19 lines
844 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2021-3825](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3825)
![](https://img.shields.io/static/v1?label=Product&message=Lider&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%202.1.16%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-306%20Missing%20Authentication%20for%20Critical%20Function&color=brighgreen)
### Description
On 2.1.15 version and below of Lider module in LiderAhenk software is leaking it's configurations via an unsecured API. An attacker with an access to the configurations API could get valid LDAP credentials.
### POC
#### Reference
- https://pentest.blog/liderahenk-0day-all-your-pardus-clients-belongs-to-me/
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/mdisec/mdisec-twitch-yayinlari