← Back to CVEs
CVE-2023-38994
HIGH7.9
Description
The 'check_univention_joinstatus' prometheus monitoring script (and other scripts) in UCS 5.0-5 revealed the LDAP plaintext password of the machine account in the process list allowing attackers with local ssh access to gain higher privileges and perform followup attacks. By default, the configuration of UCS does not allow local ssh access for regular users.
CVE Details
CVSS v3.1 Score7.9
SeverityHIGH
CVSS VectorCVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
Attack VectorLOCAL
ComplexityLOW
Privileges RequiredHIGH
User InteractionNONE
Published10/31/2023
Last Modified4/15/2025
Sourcenvd
Honeypot Sightings0
Affected Products
univention:univention_corporate_server
Weaknesses (CWE)
CWE-668
References
https://forge.univention.org/bugzilla/show_bug.cgi?id=56324(cve@mitre.org)
https://www.drive-byte.de/en/blog/simple-yet-effective-the-story-of-some-simple-bugs-that-led-to-the-complete-compromise-of-a-network(cve@mitre.org)
https://forge.univention.org/bugzilla/show_bug.cgi?id=56324(af854a3a-2127-422b-91ae-364da2661108)
https://forge.univention.org/bugzilla/show_bug.cgi?id=56324#c0(af854a3a-2127-422b-91ae-364da2661108)
https://www.drive-byte.de/en/blog/simple-yet-effective-the-story-of-some-simple-bugs-that-led-to-the-complete-compromise-of-a-network(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.