{"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Lider","vendor":"TUBITAK","versions":[{"lessThan":"2.1.16","status":"affected","version":"unspecified","versionType":"custom"}]}],"credits":[{"lang":"en","type":"finder","user":"00000000-0000-4000-9000-000000000000","value":"Mehmet INCE from PRODAFT"}],"datePublic":"2021-09-16T21:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>On 2.1.15 version and below of Lider module in LiderAhenk software is leaking it's configurations via an unsecured API. An attacker with an access to the configurations API could get valid LDAP credentials.</p>"}],"value":"On 2.1.15 version and below of Lider module in LiderAhenk software is leaking it's configurations via an unsecured API. An attacker with an access to the configurations API could get valid LDAP credentials."}],"exploits":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>https://github.com/mdisec/pardus-liderahenk-0day-RCE</p>"}],"value":"https://github.com/mdisec/pardus-liderahenk-0day-RCE"}],"impacts":[{"capecId":"CAPEC-136","descriptions":[{"lang":"en","value":"CAPEC-136 LDAP Injection"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"ADJACENT_NETWORK","availabilityImpact":"HIGH","baseScore":9.6,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-306","description":"CWE-306 Missing Authentication for Critical Function","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"ca940d4e-fea4-4aa2-9a58-591a58b1ce21","shortName":"TR-CERT","dateUpdated":"2023-09-03T16:05:47.740Z"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://www.usom.gov.tr/bildirim/tr-21-0795"},{"tags":["x_refsource_CONFIRM"],"url":"https://pentest.blog/liderahenk-0day-all-your-pardus-clients-belongs-to-me/"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>Lider component should be updated to 2.1.16.</p>"}],"value":"Lider component should be updated to 2.1.16."}],"source":{"advisory":"TR-21-0795","defect":["TR-21-0795"],"discovery":"EXTERNAL"},"title":"Missing Authorization Checks in LiderAhenk","x_generator":{"engine":"Vulnogram 0.0.9"},"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@usom.gov.tr","DATE_PUBLIC":"2021-09-17T00:00:00.000Z","ID":"CVE-2021-3825","STATE":"PUBLIC","TITLE":"Missing Authorization Checks in LiderAhenk"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Lider","version":{"version_data":[{"version_affected":"<","version_value":"2.1.16"}]}}]},"vendor_name":"TUBITAK"}]}},"credit":[{"lang":"eng","value":"Mehmet INCE from PRODAFT"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"On 2.1.15 version and below of Lider module in LiderAhenk software is leaking it's configurations via an unsecured API. An attacker with an access to the configurations API could get valid LDAP credentials."}]},"exploit":[{"lang":"en","value":"https://github.com/mdisec/pardus-liderahenk-0day-RCE"}],"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"ADJACENT_NETWORK","availabilityImpact":"HIGH","baseScore":9.6,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-306 Missing Authentication for Critical Function"}]}]},"references":{"reference_data":[{"name":"https://www.usom.gov.tr/bildirim/tr-21-0795","refsource":"CONFIRM","url":"https://www.usom.gov.tr/bildirim/tr-21-0795"},{"name":"https://pentest.blog/liderahenk-0day-all-your-pardus-clients-belongs-to-me/","refsource":"CONFIRM","url":"https://pentest.blog/liderahenk-0day-all-your-pardus-clients-belongs-to-me/"}]},"solution":[{"lang":"en","value":"Lider component should be updated to 2.1.16."}],"source":{"advisory":"TR-21-0795","defect":["TR-21-0795"],"discovery":"EXTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T17:09:09.506Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://www.usom.gov.tr/bildirim/tr-21-0795"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://pentest.blog/liderahenk-0day-all-your-pardus-clients-belongs-to-me/"}]}]},"cveMetadata":{"assignerOrgId":"ca940d4e-fea4-4aa2-9a58-591a58b1ce21","assignerShortName":"TR-CERT","cveId":"CVE-2021-3825","datePublished":"2021-10-01T14:36:20.926Z","dateReserved":"2021-09-22T00:00:00.000Z","dateUpdated":"2024-09-16T19:56:05.415Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}