{
  "threat_severity" : "Moderate",
  "public_date" : "2022-05-31T00:00:00Z",
  "bugzilla" : {
    "description" : "389-ds-base: access control bypass by query (filter in LDAP terms) optimiser",
    "id" : "2091781",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2091781"
  },
  "cvss3" : {
    "cvss3_base_score" : "7.4",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
    "status" : "draft"
  },
  "cwe" : "CWE-863->CWE-1220",
  "details" : [ "An access control bypass vulnerability found in 389-ds-base. That mishandling of the filter that would yield incorrect results, but as that has progressed, can be determined that it actually is an access control bypass. This may allow any remote unauthenticated user to issue a filter that allows searching for database items they do not have access to, including but not limited to potentially userPassword hashes and other sensitive data.", "A flaw was found in the 389-ds-base package where some LDAP queries can cause performance issues. This flaw allows an attacker to send a non-optimal search that causes serious performance issues within the directory server." ],
  "package_state" : [ {
    "product_name" : "Red Hat Directory Server 11",
    "fix_state" : "Will not fix",
    "package_name" : "redhat-ds:11/389-ds-base",
    "cpe" : "cpe:/a:redhat:directory_server:11"
  }, {
    "product_name" : "Red Hat Directory Server 12",
    "fix_state" : "Will not fix",
    "package_name" : "redhat-ds:12/389-ds-base",
    "cpe" : "cpe:/a:redhat:directory_server:12"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "389-ds-base",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Out of support scope",
    "package_name" : "389-ds-base",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Not affected",
    "package_name" : "389-ds:1.4/389-ds-base",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Not affected",
    "package_name" : "389-ds-base",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2022-1949\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-1949\nhttps://github.com/389ds/389-ds-base/issues/5170" ],
  "name" : "CVE-2022-1949",
  "csaw" : false
}