SSSD 1.9.0/1.9.1/1.9.2/1.9.3/1.9.4 Access Restriction access control
CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
5.2 | $0-$5k | 0.00 |
A vulnerability, which was classified as critical, has been found in SSSD 1.9.0/1.9.1/1.9.2/1.9.3/1.9.4. This issue affects some unknown processing of the component Access Restriction. The manipulation with an unknown input leads to a access control vulnerability. Using CWE to declare the problem leads to CWE-264. Impacted is confidentiality, and integrity. The summary by CVE is:
The Simple Access Provider in System Security Services Daemon (SSSD) 1.9.0 through 1.9.4, when the Active Directory provider is used, does not properly enforce the simple_deny_groups option, which allows remote authenticated users to bypass intended access restrictions.
The weakness was shared 03/21/2013 as confirmed git commit (GIT Repository). It is possible to read the advisory at git.fedorahosted.org. The identification of this vulnerability is CVE-2013-0287 since 12/06/2012. The attack may be initiated remotely. Required for exploitation is a simple authentication. The technical details are unknown and an exploit is not publicly available. The attack technique deployed by this issue is T1068 according to MITRE ATT&CK.
The vulnerability scanner Nessus provides a plugin with the ID 68793 (Oracle Linux 6 : sssd (ELSA-2013-0663)), which helps to determine the existence of the flaw in a target environment. It is assigned to the family Oracle Linux Local Security Checks.
Applying a patch is able to eliminate this problem. The bugfix is ready for download at git.fedorahosted.org.
The vulnerability is also documented in the databases at X-Force (82943) and Tenable (68793).
Product
Name
Version
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔍VulDB CVSS-BT Score: 🔍
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.4VulDB Meta Temp Score: 5.2
VulDB Base Score: 5.4
VulDB Temp Score: 5.2
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Access controlCWE: CWE-264
ATT&CK: T1068
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Nessus ID: 68793
Nessus Name: Oracle Linux 6 : sssd (ELSA-2013-0663)
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Port: 🔍
OpenVAS ID: 881693
OpenVAS Name: CentOS Update for libipa_hbac CESA-2013:0663 centos6
OpenVAS File: 🔍
OpenVAS Family: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: PatchStatus: 🔍
0-Day Time: 🔍
Patch: git.fedorahosted.org
Timeline
12/06/2012 🔍03/19/2013 🔍
03/19/2013 🔍
03/20/2013 🔍
03/20/2013 🔍
03/21/2013 🔍
03/21/2013 🔍
03/24/2013 🔍
07/12/2013 🔍
03/24/2015 🔍
01/01/2022 🔍
Sources
Advisory: RHSA-2013:0508Status: Confirmed
Confirmation: 🔍
CVE: CVE-2013-0287 (🔍)
OVAL: 🔍
X-Force: 82943
SecurityTracker: 1028317 - System Security Services Daemon (SSSD) Access Control Flaw Lets Remote Users Bypass Access Controls in Certain Configurations
Vulnerability Center: 38877 - Fedora SSSD 1.9.0 - 1.9.4 Simple Access Provider Allows Remote Authenticated Restrictions Bypass, Low
SecurityFocus: 58593 - SSSD CVE-2013-0287 Remote Security Bypass Vulnerability
Secunia: 52704 - SSSD Simple Access Provider "simple_deny_groups" Access Control Bypass Security, Less Critical
Entry
Created: 03/24/2015 12:22Updated: 01/01/2022 15:17
Changes: 03/24/2015 12:22 (69), 04/26/2017 17:40 (11), 01/01/2022 15:12 (3), 01/01/2022 15:17 (2)
Complete: 🔍
No comments yet. Languages: en.
Please log in to comment.