An issue was discovered in YSoft SAFEQ 6 Server before 6.0.82. When modifying the URL of the LDAP server configuration from LDAPS to LDAP, the system does not require the password to be (re)entered. This results in exposing cleartext credentials when connecting to a rogue LDAP server. NOTE: the vendor originally reported this as a security issue but then reconsidered because of the requirement for Admin access in order to change the configuration.
References
Link | Resource |
---|---|
https://www.ysoft.com/en/legal/ldaps-encryption-downgrade-attack-vulnerability | Vendor Advisory |
https://ysoft.com | Product |
https://www.ysoft.com/en/legal/ldaps-encryption-downgrade-attack-vulnerability | Vendor Advisory |
https://ysoft.com | Product |
Configurations
History
21 Nov 2024, 08:08
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.ysoft.com/en/legal/ldaps-encryption-downgrade-attack-vulnerability - Vendor Advisory | |
References | () https://ysoft.com - Product |
07 Nov 2023, 04:16
Type | Values Removed | Values Added |
---|---|---|
Summary | An issue was discovered in YSoft SAFEQ 6 Server before 6.0.82. When modifying the URL of the LDAP server configuration from LDAPS to LDAP, the system does not require the password to be (re)entered. This results in exposing cleartext credentials when connecting to a rogue LDAP server. NOTE: the vendor originally reported this as a security issue but then reconsidered because of the requirement for Admin access in order to change the configuration. |
11 Sep 2023, 15:15
Type | Values Removed | Values Added |
---|---|---|
Summary | ** DISPUTED ** An issue was discovered in YSoft SAFEQ 6 Server before 6.0.82. When modifying the URL of the LDAP server configuration from LDAPS to LDAP, the system does not require the password to be (re)entered. This results in exposing cleartext credentials when connecting to a rogue LDAP server. NOTE: the vendor originally reported this as a security issue but then reconsidered because of the requirement for Admin access in order to change the configuration. |
25 Jul 2023, 18:55
Type | Values Removed | Values Added |
---|---|---|
First Time |
Ysoft
Ysoft safeq Server |
|
References | (MISC) https://ysoft.com - Product | |
References | (MISC) https://www.ysoft.com/en/legal/ldaps-encryption-downgrade-attack-vulnerability - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
CWE | CWE-319 | |
CPE | cpe:2.3:h:ysoft:safeq_server:*:*:*:*:*:*:*:* |
13 Jul 2023, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-07-13 17:15
Updated : 2024-11-21 08:08
NVD link : CVE-2023-35833
Mitre link : CVE-2023-35833
CVE.ORG link : CVE-2023-35833
JSON object : View
Products Affected
ysoft
- safeq_server
CWE
CWE-319
Cleartext Transmission of Sensitive Information