CVE Vulnerabilities

CVE-2021-3652

Improper Authentication

Published: Apr 18, 2022 | Modified: Nov 21, 2024
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
CVSS 2.x
6.4 MEDIUM
AV:N/AC:L/Au:N/C:P/I:P/A:N
RedHat/V2
RedHat/V3
6.5 LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Ubuntu
LOW

A flaw was found in 389-ds-base. If an asterisk is imported as password hashes, either accidentally or maliciously, then instead of being inactive, any password will successfully match during authentication. This flaw allows an attacker to successfully authenticate as a user whose password was disabled.

Weakness

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Affected Software

Name Vendor Start Version End Version
389-ds-base Port389 * 2.0.7 (excluding)
Red Hat Directory Server 11.4 for RHEL 8 RedHat redhat-ds:11-8050020210920153716.d3df4063 *
Red Hat Enterprise Linux 7 RedHat 389-ds-base-0:1.3.10.2-13.el7_9 *
Red Hat Enterprise Linux 8 RedHat 389-ds:1.4-8040020210721074904.96015a92 *
Red Hat Enterprise Linux 8.2 Extended Update Support RedHat 389-ds:1.4-8020020210819193832.dbc46ba7 *
389-ds-base Ubuntu upstream *

Potential Mitigations

References