Lucene search

K
githubGitHub Advisory DatabaseGHSA-F6RC-RH43-H8GR
HistoryMay 17, 2022 - 12:28 a.m.

Zend Access Restriction Bypass

2022-05-1700:28:35
CWE-287
GitHub Advisory Database
github.com
2

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

7.3 High

AI Score

Confidence

Low

0.006 Low

EPSS

Percentile

78.7%

The (1) Zend_Ldap class in Zend before 1.12.9 and (2) Zend\Ldap component in Zend 2.x before 2.2.8 and 2.3.x before 2.3.3 allows remote attackers to bypass authentication via a password starting with a null byte, which triggers an unauthenticated bind.

Affected configurations

Vulners
Node
zendframeworkzendframework1Range<1.12.9
OR
zendframeworkzendframeworkRange<2.3.3
OR
zendframeworkzendframeworkRange<2.2.8
OR
zendframeworkzendframeworkRange<2.1.99
OR
zendframeworkzendframeworkRange<2.0.99

References

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

7.3 High

AI Score

Confidence

Low

0.006 Low

EPSS

Percentile

78.7%