Hide Forgot
mishandling of the filter that would yield incorrect results, but as that has progressed, we have determined that it actually is an access control bypass. This may allow any remote un-authenticated user to issue a filter that allows searching for database items they do not have access to, including but not limited to potentially userPassword hashes and other sensitive data. https://github.com/389ds/389-ds-base/issues/5170
Created 389-ds-base tracking bugs for this issue: Affects: fedora-34 [bug 2091786] Affects: fedora-35 [bug 2091787] Affects: fedora-36 [bug 2091788]
Hi there, thanks for creating this! It's worth pointing out that since this was found, we have a working (public) reproducer, and that it may be possible to use this to extract userPassword hashes, private keys, kerberos master keys (freeipa). I think the access complexity may also have dropped as a result of this. Additionally, this affects all versions of 389-ds from 1.3.x onwards. Hope that helps, There are patches upstream: see: https://github.com/389ds/389-ds-base/issues/5170#issuecomment-1140630971