An issue was discovered in YSoft SAFEQ 6 Server before 6.0.82. When modifying the URL of the LDAP server configuration from LDAPS to LDAP, the system does not require the password to be (re)entered. This results in exposing cleartext credentials when connecting to a rogue LDAP server. NOTE: the vendor originally reported this as a security issue but then reconsidered because of the requirement for Admin access in order to change the configuration.
References
Link | Resource |
---|---|
https://www.ysoft.com/en/legal/ldaps-encryption-downgrade-attack-vulnerability | Vendor Advisory |
https://ysoft.com | Product |
Configurations
History
No history.
Information
Published : 2023-07-13 17:15
Updated : 2024-05-17 02:25
NVD link : CVE-2023-35833
Mitre link : CVE-2023-35833
CVE.ORG link : CVE-2023-35833
JSON object : View
Products Affected
ysoft
- safeq_server
CWE
CWE-319
Cleartext Transmission of Sensitive Information