Vulnerability Details : CVE-2022-24851
LDAP Account Manager (LAM) is an open source web frontend for managing entries stored in an LDAP directory. The profile editor tool has an edit profile functionality, the parameters on this page are not properly sanitized and hence leads to stored XSS attacks. An authenticated user can store XSS payloads in the profiles, which gets triggered when any other user try to access the edit profile page. The pdf editor tool has an edit pdf profile functionality, the logoFile parameter in it is not properly sanitized and an user can enter relative paths like ../../../../../../../../../../../../../usr/share/icons/hicolor/48x48/apps/gvim.png via tools like burpsuite. Later when a pdf is exported using the edited profile the pdf icon has the image on that path(if image is present). Both issues require an attacker to be able to login to LAM admin interface. The issue is fixed in version 7.9.1.
Vulnerability category: Cross site scripting (XSS)Directory traversal
Products affected by CVE-2022-24851
- cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
- cpe:2.3:a:ldap-account-manager:ldap_account_manager:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-24851
0.16%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 53 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-24851
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
3.5
|
LOW | AV:N/AC:M/Au:S/C:N/I:P/A:N |
6.8
|
2.9
|
NIST | |
4.8
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N |
1.7
|
2.7
|
NIST | |
8.1
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N |
1.7
|
5.8
|
GitHub, Inc. |
CWE ids for CVE-2022-24851
-
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.Assigned by: security-advisories@github.com (Secondary)
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by:
- nvd@nist.gov (Primary)
- security-advisories@github.com (Secondary)
References for CVE-2022-24851
-
https://github.com/LDAPAccountManager/lam/issues/170
Multiple vulnerabilities in LDAP Account Manager · Issue #170 · LDAPAccountManager/lam · GitHubExploit;Patch;Third Party Advisory
-
https://github.com/LDAPAccountManager/lam/security/advisories/GHSA-f2fr-cccr-583v
Stored XSS and arbitrary image read vulnerability · Advisory · LDAPAccountManager/lam · GitHubPatch;Third Party Advisory
-
https://www.debian.org/security/2022/dsa-5177
Debian -- Security Information -- DSA-5177-1 ldap-account-managerThird Party Advisory
-
https://github.com/LDAPAccountManager/lam/commit/3c6f09a3579e048e224eb5a4c4e3eefaa8bccd49
#170 fixed security issues in profile editor and PDF editor · LDAPAccountManager/lam@3c6f09a · GitHubPatch;Third Party Advisory
Jump to