{"api_version":"1","generated_at":"2026-05-08T20:54:17+00:00","cve":"CVE-2022-31088","urls":{"html":"https://cve.report/CVE-2022-31088","api":"https://cve.report/api/cve/CVE-2022-31088.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-31088","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-31088"},"summary":{"title":"CVE-2022-31088","description":"LDAP Account Manager (LAM) is a webfrontend for managing entries (e.g. users, groups, DHCP settings) stored in an LDAP directory. In versions prior to 8.0 the user name field at login could be used to enumerate LDAP data. This is only the case for LDAP search configuration. This issue has been fixed in version 8.0.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2022-06-27 21:15:00","updated_at":"2022-07-07 15:13:00"},"problem_types":["CWE-74"],"metrics":[],"references":[{"url":"https://www.debian.org/security/2022/dsa-5177","name":"DSA-5177","refsource":"DEBIAN","tags":[],"title":"Debian -- Security Information -- DSA-5177-1 ldap-account-manager","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/LDAPAccountManager/lam/commit/f1d5d04952f39a1b4ea203d3964fa88e1429dfd4","name":"https://github.com/LDAPAccountManager/lam/commit/f1d5d04952f39a1b4ea203d3964fa88e1429dfd4","refsource":"MISC","tags":[],"title":"Merge pull request from GHSA-r387-grjx-qgvw · LDAPAccountManager/lam@f1d5d04 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/LDAPAccountManager/lam/security/advisories/GHSA-wxf8-9x99-6gp4","name":"https://github.com/LDAPAccountManager/lam/security/advisories/GHSA-wxf8-9x99-6gp4","refsource":"CONFIRM","tags":[],"title":"Unauthenticated LDAP Injection · Advisory · LDAPAccountManager/lam · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-31088","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-31088","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"31088","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"11.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"31088","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ldap-account-manager","cpe5":"ldap_account_manager","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-31088","qid":"180808","title":"Debian Security Update for ldap-account-manager (DSA 5177-1)"},{"cve":"CVE-2022-31088","qid":"183434","title":"Debian Security Update for ldap-account-manager (CVE-2022-31088)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2022-31088","STATE":"PUBLIC","TITLE":"Unauthenticated LDAP Injection in ldap-account-manager"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"lam","version":{"version_data":[{"version_value":"< 8.0"}]}}]},"vendor_name":"LDAPAccountManager"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"LDAP Account Manager (LAM) is a webfrontend for managing entries (e.g. users, groups, DHCP settings) stored in an LDAP directory. In versions prior to 8.0 the user name field at login could be used to enumerate LDAP data. This is only the case for LDAP search configuration. This issue has been fixed in version 8.0."}]},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":6.5,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L","version":"3.0"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')"}]}]},"references":{"reference_data":[{"name":"https://github.com/LDAPAccountManager/lam/security/advisories/GHSA-wxf8-9x99-6gp4","refsource":"CONFIRM","url":"https://github.com/LDAPAccountManager/lam/security/advisories/GHSA-wxf8-9x99-6gp4"},{"name":"https://github.com/LDAPAccountManager/lam/commit/f1d5d04952f39a1b4ea203d3964fa88e1429dfd4","refsource":"MISC","url":"https://github.com/LDAPAccountManager/lam/commit/f1d5d04952f39a1b4ea203d3964fa88e1429dfd4"},{"refsource":"DEBIAN","name":"DSA-5177","url":"https://www.debian.org/security/2022/dsa-5177"}]},"source":{"advisory":"GHSA-wxf8-9x99-6gp4","discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2022-06-27 21:15:00","lastModifiedDate":"2022-07-07 15:13:00","problem_types":["CWE-74"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5.3,"baseSeverity":"MEDIUM"},"exploitabilityScore":3.9,"impactScore":1.4},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5},"severity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ldap-account-manager:ldap_account_manager:*:*:*:*:*:*:*:*","versionEndExcluding":"8.0","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}