mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
72 lines
4.0 KiB
JSON
72 lines
4.0 KiB
JSON
{
|
|
"id": "CVE-2024-52792",
|
|
"sourceIdentifier": "security-advisories@github.com",
|
|
"published": "2024-12-17T22:15:07.083",
|
|
"lastModified": "2024-12-17T22:15:07.083",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "LDAP Account Manager (LAM) is a php webfrontend for managing entries (e.g. users, groups, DHCP settings) stored in an LDAP directory. In affected versions LAM does not properly sanitize configuration values, that are set via `mainmanage.php` and `confmain.php`. This allows setting arbitrary config values and thus effectively bypassing `mitigation` of CVE-2024-23333/GHSA-fm9w-7m7v-wxqv. Configuration values for the main config or server profiles are set via `mainmanage.php` and `confmain.php`.\nThe values are written to `config.cfg` or `serverprofile.conf` in the format of `settingsName: settingsValue` line-by-line.\nAn attacker can smuggle arbitrary config values in a config file, by inserting a newline into certain config fields, followed by the value. This vulnerability has been addressed in version 9.0. All users are advised to upgrade. There are no known workarounds for this vulnerability."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "LDAP Account Manager (LAM) es una interfaz web php para administrar entradas (por ejemplo, usuarios, grupos, configuraciones DHCP) almacenado en un directorio LDAP. En las versiones afectadas, LAM no desinfecta correctamente los valores de configuraci\u00f3n que se establecen a trav\u00e9s de `mainmanage.php` y `confmain.php`. Esto permite establecer valores de configuraci\u00f3n arbitrarios y, por lo tanto, evitar de manera efectiva la `mitigaci\u00f3n` de CVE-2024-23333/GHSA-fm9w-7m7v-wxqv. Los valores de configuraci\u00f3n para la configuraci\u00f3n principal o los perfiles de servidor se establecen a trav\u00e9s de `mainmanage.php` y `confmain.php`. Los valores se escriben en `config.cfg` o `serverprofile.conf` en el formato `settingsName: settingsValue` l\u00ednea por l\u00ednea. Un atacante puede contrabandear valores de configuraci\u00f3n arbitrarios en un archivo de configuraci\u00f3n, insertando una nueva l\u00ednea en ciertos campos de configuraci\u00f3n, seguida del valor. Esta vulnerabilidad se ha solucionado en la versi\u00f3n 9.0. Se recomienda a todos los usuarios que actualicen la versi\u00f3n. No existen workarounds conocidas para esta vulnerabilidad."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
|
|
"baseScore": 6.5,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "HIGH",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH"
|
|
},
|
|
"exploitabilityScore": 1.2,
|
|
"impactScore": 5.2
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-610"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://github.com/LDAPAccountManager/lam/blob/fd665fef3b222bf8205154b14f676815d2d6ae20/lam/templates/config/mainmanage.php#L263",
|
|
"source": "security-advisories@github.com"
|
|
},
|
|
{
|
|
"url": "https://github.com/LDAPAccountManager/lam/releases/tag/9.0",
|
|
"source": "security-advisories@github.com"
|
|
},
|
|
{
|
|
"url": "https://github.com/LDAPAccountManager/lam/security/advisories/GHSA-6cp9-j5r7-xhcc",
|
|
"source": "security-advisories@github.com"
|
|
},
|
|
{
|
|
"url": "https://github.com/LDAPAccountManager/lam/security/advisories/GHSA-fm9w-7m7v-wxqv",
|
|
"source": "security-advisories@github.com"
|
|
}
|
|
]
|
|
} |