Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:h:ysoft:safeq_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D367A15-4EB0-47A3-B359-20E87C26CDBB", "versionEndExcluding": "6.0.82", "versionStartIncluding": "6.0", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [{"sourceIdentifier": "cve@mitre.org", "tags": ["disputed"]}], "descriptions": [{"lang": "en", "value": "An issue was discovered in YSoft SAFEQ 6 Server before 6.0.82. When modifying the URL of the LDAP server configuration from LDAPS to LDAP, the system does not require the password to be (re)entered. This results in exposing cleartext credentials when connecting to a rogue LDAP server. NOTE: the vendor originally reported this as a security issue but then reconsidered because of the requirement for Admin access in order to change the configuration."}, {"lang": "es", "value": "** EN DISPUTA ** Se descubri\u00f3 un problema en YSoft SAFEQ 6 Server antes de la versi\u00f3n 6.0.82. Al modificar la URL de la configuraci\u00f3n del servidor LDAP de LDAPS a LDAP, el sistema no requiere que se (re)ingrese la contrase\u00f1a. Esto da como resultado la exposici\u00f3n de credenciales en texto claro al conectarse a un servidor LDAP no autorizado. NOTA: el proveedor inform\u00f3 originalmente esto como un problema de seguridad, pero luego lo reconsider\u00f3 debido al requisito de acceso de administrador para poder cambiar la configuraci\u00f3n.\n"}], "id": "CVE-2023-35833", "lastModified": "2024-11-21T08:08:46.997", "metrics": {"cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2023-07-13T17:15:09.270", "references": [{"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "https://www.ysoft.com/en/legal/ldaps-encryption-downgrade-attack-vulnerability"}, {"source": "cve@mitre.org", "tags": ["Product"], "url": "https://ysoft.com"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://www.ysoft.com/en/legal/ldaps-encryption-downgrade-attack-vulnerability"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Product"], "url": "https://ysoft.com"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-319"}], "source": "nvd@nist.gov", "type": "Primary"}]}