Bugzilla will be upgraded to version 5.0 on December 2, 2018. The outage period for the upgrade will start at 0:00 UTC and have a duration of 12 hours
Bug 901875 - (CVE-2013-1364) CVE-2013-1364 zabbix: possible to override LDAP configuration parameters via the API
CVE-2013-1364 zabbix: possible to override LDAP configuration parameters via ...
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
: Security
Depends On: 901876 901877 901878 1082437
  Show dependency treegraph
Reported: 2013-01-19 13:38 EST by Vincent Danen
Modified: 2014-03-31 01:10 EDT (History)
9 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2013-04-28 03:29:46 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Vincent Danen 2013-01-19 13:38:34 EST
It was reported [1] that the user.login method in Zabbix would accept a 'cnf' parameter containing the configuration parameters to use for LDAP authentication, which would override the configuration stored in the database.  This can be used to authenticate to Zabbix using a completely different LDAP application (e.g. authenticate to Zabbix using some other LDAP directory the attacker has credentials for).

This has been corrected in upstream versions 2.1.0 r32446, 2.0.5rc1 r32444 and 1.8.16rc1 r32442.  Patches are attached to the upstream bug report.

[1] https://support.zabbix.com/browse/ZBX-6097
Comment 1 Vincent Danen 2013-01-19 13:39:55 EST
Created zabbix tracking bugs for this issue

Affects: epel-6 [bug 901876]
Affects: fedora-all [bug 901878]
Comment 2 Vincent Danen 2013-01-19 13:39:58 EST
Created zabbix20 tracking bugs for this issue

Affects: epel-6 [bug 901877]

Note You need to log in before you can comment on or make changes to this bug.