{"api_version":"1","generated_at":"2026-05-08T20:54:11+00:00","cve":"CVE-2022-31084","urls":{"html":"https://cve.report/CVE-2022-31084","api":"https://cve.report/api/cve/CVE-2022-31084.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-31084","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-31084"},"summary":{"title":"CVE-2022-31084","description":"LDAP Account Manager (LAM) is a webfrontend for managing entries (e.g. users, groups, DHCP settings) stored in an LDAP directory. In versions prior to 8.0 There are cases where LAM instantiates objects from arbitrary classes. An attacker can inject the first constructor argument. This can lead to code execution if non-LAM classes are instantiated that execute code during object creation. This issue has been fixed in version 8.0.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2022-06-27 21:15:00","updated_at":"2022-10-28 19:19:00"},"problem_types":["CWE-88"],"metrics":[],"references":[{"url":"https://github.com/LDAPAccountManager/lam/security/advisories/GHSA-r387-grjx-qgvw","name":"https://github.com/LDAPAccountManager/lam/security/advisories/GHSA-r387-grjx-qgvw","refsource":"CONFIRM","tags":[],"title":"Unauthenticated Arbitrary Object Instantiation / Unauthenticated Remote Code Execution · Advisory · LDAPAccountManager/lam · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.debian.org/security/2022/dsa-5177","name":"DSA-5177","refsource":"DEBIAN","tags":[],"title":"Debian -- Security Information -- DSA-5177-1 ldap-account-manager","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://swarm.ptsecurity.com/exploiting-arbitrary-object-instantiations/","name":"https://swarm.ptsecurity.com/exploiting-arbitrary-object-instantiations/","refsource":"MISC","tags":[],"title":"Exploiting Arbitrary Object Instantiations in PHP without Custom Classes – PT SWARM","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/LDAPAccountManager/lam/commit/f1d5d04952f39a1b4ea203d3964fa88e1429dfd4","name":"https://github.com/LDAPAccountManager/lam/commit/f1d5d04952f39a1b4ea203d3964fa88e1429dfd4","refsource":"MISC","tags":[],"title":"Merge pull request from GHSA-r387-grjx-qgvw · LDAPAccountManager/lam@f1d5d04 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-31084","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-31084","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"31084","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"11.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"31084","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ldap-account-manager","cpe5":"ldap_account_manager","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-31084","qid":"180808","title":"Debian Security Update for ldap-account-manager (DSA 5177-1)"},{"cve":"CVE-2022-31084","qid":"183411","title":"Debian Security Update for ldap-account-manager (CVE-2022-31084)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2022-31084","STATE":"PUBLIC","TITLE":"Unauthenticated Remote Code Execution in ldap-account-manager"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"lam","version":{"version_data":[{"version_value":"< 8.0"}]}}]},"vendor_name":"LDAPAccountManager"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"LDAP Account Manager (LAM) is a webfrontend for managing entries (e.g. users, groups, DHCP settings) stored in an LDAP directory. In versions prior to 8.0 There are cases where LAM instantiates objects from arbitrary classes. An attacker can inject the first constructor argument. This can lead to code execution if non-LAM classes are instantiated that execute code during object creation. This issue has been fixed in version 8.0."}]},"impact":{"cvss":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H","version":"3.0"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')"}]}]},"references":{"reference_data":[{"name":"https://github.com/LDAPAccountManager/lam/commit/f1d5d04952f39a1b4ea203d3964fa88e1429dfd4","refsource":"MISC","url":"https://github.com/LDAPAccountManager/lam/commit/f1d5d04952f39a1b4ea203d3964fa88e1429dfd4"},{"name":"https://github.com/LDAPAccountManager/lam/security/advisories/GHSA-r387-grjx-qgvw","refsource":"CONFIRM","url":"https://github.com/LDAPAccountManager/lam/security/advisories/GHSA-r387-grjx-qgvw"},{"refsource":"DEBIAN","name":"DSA-5177","url":"https://www.debian.org/security/2022/dsa-5177"},{"refsource":"MISC","name":"https://swarm.ptsecurity.com/exploiting-arbitrary-object-instantiations/","url":"https://swarm.ptsecurity.com/exploiting-arbitrary-object-instantiations/"}]},"source":{"advisory":"GHSA-r387-grjx-qgvw","discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2022-06-27 21:15:00","lastModifiedDate":"2022-10-28 19:19:00","problem_types":["CWE-88"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH"},"exploitabilityScore":2.2,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":6.8},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ldap-account-manager:ldap_account_manager:*:*:*:*:*:*:*:*","versionEndExcluding":"8.0","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}