← Voltar para CVEs
CVE-2023-38994
HIGH7.9
Descricao
The 'check_univention_joinstatus' prometheus monitoring script (and other scripts) in UCS 5.0-5 revealed the LDAP plaintext password of the machine account in the process list allowing attackers with local ssh access to gain higher privileges and perform followup attacks. By default, the configuration of UCS does not allow local ssh access for regular users.
Detalhes CVE
Pontuacao CVSS v3.17.9
SeveridadeHIGH
Vetor CVSSCVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
Vetor de ataqueLOCAL
ComplexidadeLOW
Privilegios necessariosHIGH
Interacao do usuarioNONE
Publicado10/31/2023
Ultima modificacao4/15/2025
Fontenvd
Avistamentos honeypot0
Produtos afetados
univention:univention_corporate_server
Fraquezas (CWE)
CWE-668
Referencias
https://forge.univention.org/bugzilla/show_bug.cgi?id=56324(cve@mitre.org)
https://www.drive-byte.de/en/blog/simple-yet-effective-the-story-of-some-simple-bugs-that-led-to-the-complete-compromise-of-a-network(cve@mitre.org)
https://forge.univention.org/bugzilla/show_bug.cgi?id=56324(af854a3a-2127-422b-91ae-364da2661108)
https://forge.univention.org/bugzilla/show_bug.cgi?id=56324#c0(af854a3a-2127-422b-91ae-364da2661108)
https://www.drive-byte.de/en/blog/simple-yet-effective-the-story-of-some-simple-bugs-that-led-to-the-complete-compromise-of-a-network(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.