Executive Summary
Summary | |
---|---|
Title | New zope-ldapuserfolder packages fix authentication bypass |
Informations | |||
---|---|---|---|
Name | DSA-2096 | First vendor Publication | 2010-08-24 |
Vendor | Debian | Last vendor Modification | 2010-08-24 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Jeremy James discovered that in zope-ldapuserfolder, a Zope extension used to authenticate against an LDAP server, the authentication code does not verify the password provided for the emergency user. Malicious users that manage to get the emergency user login can use this flaw to gain administrative access to the Zope instance, by providing an arbitrary password. For the stable distribution (lenny), this problem has been fixed in version 2.9-1+lenny1. The package no longer exists in the upcoming stable distribution (squeeze) or the unstable distribution. We recommend that you upgrade your zope-ldapuserfolder package. |
Original Source
Url : http://www.debian.org/security/2010/dsa-2096 |
Alert History
Date | Informations |
---|---|
2016-04-26 21:44:35 |
|
2014-02-17 11:29:37 |
|
2013-05-11 00:43:50 |
|