Vigil@nce - 389 Directory Server: information disclosure via Password
January 2017 by Vigil@nce
This bulletin was written by Vigil@nce : https://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can bypass access restrictions to data via Password of
389 Directory Server, in order to obtain sensitive information.
Impacted products: Fedora, RHEL.
Severity: 2/4.
Creation date: 03/11/2016.
DESCRIPTION OF THE VULNERABILITY
The 389 Directory Server product offers a web service.
However, an attacker can bypass access restrictions to data.
An attacker can therefore use a vulnerability via Password of 389
Directory Server, in order to obtain sensitive information.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
https://vigilance.fr/vulnerability/389-Directory-Server-information-disclosure-via-Password-21030