Bug 901875 (CVE-2013-1364) - CVE-2013-1364 zabbix: possible to override LDAP configuration parameters via the API
Summary: CVE-2013-1364 zabbix: possible to override LDAP configuration parameters via ...
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: CVE-2013-1364
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 901876 901877 901878 1082437
Blocks:
TreeView+ depends on / blocked
 
Reported: 2013-01-19 18:38 UTC by Vincent Danen
Modified: 2019-09-29 12:59 UTC (History)
9 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2013-04-28 07:29:46 UTC
Embargoed:


Attachments (Terms of Use)

Description Vincent Danen 2013-01-19 18:38:34 UTC
It was reported [1] that the user.login method in Zabbix would accept a 'cnf' parameter containing the configuration parameters to use for LDAP authentication, which would override the configuration stored in the database.  This can be used to authenticate to Zabbix using a completely different LDAP application (e.g. authenticate to Zabbix using some other LDAP directory the attacker has credentials for).

This has been corrected in upstream versions 2.1.0 r32446, 2.0.5rc1 r32444 and 1.8.16rc1 r32442.  Patches are attached to the upstream bug report.

[1] https://support.zabbix.com/browse/ZBX-6097

Comment 1 Vincent Danen 2013-01-19 18:39:55 UTC
Created zabbix tracking bugs for this issue

Affects: epel-6 [bug 901876]
Affects: fedora-all [bug 901878]

Comment 2 Vincent Danen 2013-01-19 18:39:58 UTC
Created zabbix20 tracking bugs for this issue

Affects: epel-6 [bug 901877]


Note You need to log in before you can comment on or make changes to this bug.