On 2.1.15 version and below of Lider module in LiderAhenk software is leaking it's configurations via an unsecured API. An attacker with an access to the configurations API could get valid LDAP credentials.
References
Link | Resource |
---|---|
https://pentest.blog/liderahenk-0day-all-your-pardus-clients-belongs-to-me/ | Exploit Third Party Advisory |
https://www.usom.gov.tr/bildirim/tr-21-0795 | Third Party Advisory |
https://pentest.blog/liderahenk-0day-all-your-pardus-clients-belongs-to-me/ | Exploit Third Party Advisory |
https://www.usom.gov.tr/bildirim/tr-21-0795 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2021-10-01 15:15
Updated : 2024-11-21 06:22
NVD link : CVE-2021-3825
Mitre link : CVE-2021-3825
CVE.ORG link : CVE-2021-3825
JSON object : View
Products Affected
pardus
- liderahenk
CWE
CWE-306
Missing Authentication for Critical Function