Executive Summary

Summary
TitleNew zope-ldapuserfolder packages fix authentication bypass
Informations
NameDSA-2096First vendor Publication2010-08-24
VendorDebianLast vendor Modification2010-08-24
Severity (Vendor) N/ARevision1

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score7.5Attack RangeNetwork
Cvss Impact Score6.4Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Jeremy James discovered that in zope-ldapuserfolder, a Zope extension used to authenticate against an LDAP server, the authentication code does not verify the password provided for the emergency user. Malicious users that manage to get the emergency user login can use this flaw to gain administrative access to the Zope instance, by providing an arbitrary password.

For the stable distribution (lenny), this problem has been fixed in version 2.9-1+lenny1.

The package no longer exists in the upcoming stable distribution (squeeze) or the unstable distribution.

We recommend that you upgrade your zope-ldapuserfolder package.

Original Source

Url : http://www.debian.org/security/2010/dsa-2096

CWE : Common Weakness Enumeration

idName
CWE-287Improper Authentication

CPE : Common Platform Enumeration

TypeDescriptionCount
Application1

OpenVAS Exploits

DateDescription
2010-10-10Name : Debian Security Advisory DSA 2096-1 (zope-ldapuserfolder)
File : nvt/deb_2096_1.nasl

Open Source Vulnerability Database (OSVDB)

idDescription
67293Zope LDAPUserFolder Product Products/LDAPUserFolder/LDAPUserFolder.py authent...

Nessus® Vulnerability Scanner

DateDescription
2010-08-27Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2096.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
DateInformations
2014-02-17 11:29:37
  • Multiple Updates
2013-05-11 00:43:50
  • Multiple Updates