{
  "threat_severity" : "Moderate",
  "public_date" : "2023-02-27T00:00:00Z",
  "bugzilla" : {
    "description" : "RHDS: LDAP browser tries to decode userPassword instead of userCertificate attribute",
    "id" : "2173517",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2173517"
  },
  "cvss3" : {
    "cvss3_base_score" : "5.5",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-295",
  "details" : [ "A flaw was found in RHDS 11 and RHDS 12. While browsing entries LDAP tries to decode the userPassword attribute instead of the userCertificate attribute which could lead into sensitive information leaked. An attacker with a local account where the cockpit-389-ds is running can list the processes and display the hashed passwords. The highest threat from this vulnerability is to data confidentiality.", "A flaw was found in RHDS 11 and 12. While browsing entries, LDAP tries to decode the userPassword attribute instead of the userCertificate attribute, which could lead into sensitive information being leaked. This issue could allow an attacker with a local account with cockpit-389-ds running to list processes and display hashed passwords. The highest threat is to data confidentiality." ],
  "acknowledgement" : "This issue was discovered by Viktor Ashirov (Red Hat).",
  "affected_release" : [ {
    "product_name" : "Red Hat Directory Server 11.6 for RHEL 8",
    "release_date" : "2023-08-15T00:00:00Z",
    "advisory" : "RHSA-2023:4655",
    "cpe" : "cpe:/a:redhat:directory_server:11.6::el8",
    "package" : "redhat-ds:11-8070020230314201033.95958119"
  }, {
    "product_name" : "Red Hat Directory Server 12.1 for RHEL 9",
    "release_date" : "2023-06-06T00:00:00Z",
    "advisory" : "RHSA-2023:3489",
    "cpe" : "cpe:/a:redhat:directory_server:12.1::el9",
    "package" : "redhat-ds:12-9010020230314160305.1674d574"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Not affected",
    "package_name" : "389-ds-base",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "389-ds-base",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Not affected",
    "package_name" : "389-ds:1.4/389-ds-base",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Not affected",
    "package_name" : "389-ds-base",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2023-1055\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-1055" ],
  "name" : "CVE-2023-1055",
  "csaw" : false
}