It was found that sssd's sysdb_search_user_by_upn_res() function before 1.16.0 did not sanitize requests when querying its local cache and was vulnerable to injection. In a centralized login environment, if a password hash was locally cached for a given user, an authenticated attacker could use this flaw to retrieve it.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2017:3379 | vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-12173 | issue tracking patch vendor advisory |
https://access.redhat.com/errata/RHSA-2018:1877 | vendor advisory |