Lucene search

K
ubuntucveUbuntu.comUB:CVE-2022-24755
HistoryMar 15, 2022 - 12:00 a.m.

CVE-2022-24755

2022-03-1500:00:00
ubuntu.com
ubuntu.com
7

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.004 Low

EPSS

Percentile

72.5%

Bareos is open source software for backup, archiving, and recovery of data
for operating systems. When Bareos Director >= 18.2 >= 18.2 but prior to
21.1.0, 20.0.6, and 19.2.12 is built and configured for PAM authentication,
it will skip authorization checks completely. Expired accounts and accounts
with expired passwords can still login. This problem will affect users that
have PAM enabled. Currently there is no authorization (e.g. check for
expired or disabled accounts), but only plain authentication (i.e. check if
username and password match). Bareos Director versions 21.1.0, 20.0.6 and
19.2.12 implement the authorization check that was previously missing. The
only workaround is to make sure that authentication fails if the user is
not authorized.

OSVersionArchitecturePackageVersionFilename
ubuntu16.04noarchbareos< anyUNKNOWN

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.004 Low

EPSS

Percentile

72.5%