Files
CVEs-PoC/2014/CVE-2014-9422.md
T
2024-06-18 02:51:15 +02:00

18 lines
883 B
Markdown

### [CVE-2014-9422](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9422)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The check_rpcsec_auth function in kadmin/server/kadm_rpc_svc.c in kadmind in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 allows remote authenticated users to bypass a kadmin/* authorization check and obtain administrative access by leveraging access to a two-component principal with an initial "kadmind" substring, as demonstrated by a "ka/x" principal.
### POC
#### Reference
- http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2015-001.txt
#### Github
No PoCs found on GitHub currently.