Headline
CVE-2023-37468: Storing Unencrypted LDAP Passwords
Feedbacksystem is a personalized feedback system for students using artificial intelligence. Passwords of users using LDAP login are stored in clear text in the database. The LDAP users password is passed unencrypted in the LoginController.scala and stored in the database when logging in for the first time. Users using only local login or the cas login are not affected. This issue has been patched in version 1.19.2.
Package
docker thmmniii/fbs-core (Docker)
Affected versions
>= 1.5.0, < 1.19.2
Patched versions
1.19.2
Description
Impact
Passwords of users using LDAP login are stored in clear text in the database.
The LDAP users password is passed unencrypted in the LoginController.scala and stored in the database when logging in for the first time.
Users using only local login or the cas login are not affected.
Patches
This bug was fixed in 8d89612 and relased with https://github.com/thm-mni-ii/feedbacksystem/releases/tag/v1.9.2.
Workarounds
Disable the Ldap login (LDAP_ENABLED=false).
Also Users using only local login or cas login are not affected.
References
- https://github.com/thm-mni-ii/feedbacksystem/blob/dev/modules/fbs-core/api/src/main/scala/de/thm/ii/fbs/controller/LoginController.scala
- 8d89612
- https://github.com/thm-mni-ii/feedbacksystem/releases/tag/v1.9.2
- GHSA-g28r-8wg3-7349
Severity
Moderate
6.0
/ 10
CVSS base metrics
Attack vector
Local
Attack complexity
Low
Privileges required
High
User interaction
None
Scope
Changed
Confidentiality
High
Integrity
None
Availability
None
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
CVE ID
CVE-2023-37468
Weaknesses
CWE-257
Credits
- pdrtzk Reporter
- mxsph Analyst
- Zitrone44 Analyst