Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2023-4727
HistoryJun 11, 2024 - 8:15 p.m.

CVE-2023-4727

2024-06-1120:15:09
Debian Security Bug Tracker
security-tracker.debian.org
flaw
dogtag-pki
pki-core
ldap injection
token authentication
bypass
escalation of privilege
unix

7.5 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

7.9 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.7%

A flaw was found in dogtag-pki and pki-core. The token authentication scheme can be bypassed with a LDAP injection. By passing the query string parameter sessionID=*, an attacker can authenticate with an existing session saved in the LDAP directory server, which may lead to escalation of privilege.

OSVersionArchitecturePackageVersionFilename
Debian11alldogtag-pki<= 10.10.2-3dogtag-pki_10.10.2-3_all.deb
Debian999alldogtag-pki<= 11.2.1-2dogtag-pki_11.2.1-2_all.deb

7.5 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

7.9 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.7%