CVE Vulnerabilities

CVE-2014-4668

Improper Authentication

Published: Jul 02, 2014 | Modified: Apr 12, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
6.8 MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

The cherokee_validator_ldap_check function in validator_ldap.c in Cherokee 1.2.103 and earlier, when LDAP is used, does not properly consider unauthenticated-bind semantics, which allows remote attackers to bypass authentication via an empty password.

Weakness

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Affected Software

NameVendorStart VersionEnd Version
FedoraFedoraproject20 (including)20 (including)
FedoraFedoraproject21 (including)21 (including)
FedoraFedoraproject22 (including)22 (including)
CherokeeUbuntulucid*
CherokeeUbuntuprecise*
CherokeeUbuntuupstream*

Potential Mitigations

References