← Retour aux CVEs
CVE-2023-38994
HIGH7.9
Description
The 'check_univention_joinstatus' prometheus monitoring script (and other scripts) in UCS 5.0-5 revealed the LDAP plaintext password of the machine account in the process list allowing attackers with local ssh access to gain higher privileges and perform followup attacks. By default, the configuration of UCS does not allow local ssh access for regular users.
Details CVE
Score CVSS v3.17.9
SeveriteHIGH
Vecteur CVSSCVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
Vecteur d'attaqueLOCAL
ComplexiteLOW
Privileges requisHIGH
Interaction utilisateurNONE
Publie10/31/2023
Derniere modification4/15/2025
Sourcenvd
Observations honeypot0
Produits affectes
univention:univention_corporate_server
Faiblesses (CWE)
CWE-668
References
https://forge.univention.org/bugzilla/show_bug.cgi?id=56324(cve@mitre.org)
https://www.drive-byte.de/en/blog/simple-yet-effective-the-story-of-some-simple-bugs-that-led-to-the-complete-compromise-of-a-network(cve@mitre.org)
https://forge.univention.org/bugzilla/show_bug.cgi?id=56324(af854a3a-2127-422b-91ae-364da2661108)
https://forge.univention.org/bugzilla/show_bug.cgi?id=56324#c0(af854a3a-2127-422b-91ae-364da2661108)
https://www.drive-byte.de/en/blog/simple-yet-effective-the-story-of-some-simple-bugs-that-led-to-the-complete-compromise-of-a-network(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.