CVE-2019-11187
📋 TL;DR
This vulnerability allows authentication bypass in GONICUS GOsa LDAP systems. An attacker can log into any account containing the substring 'success' (case-insensitive) using any password. All GOsa installations through April 11, 2019 are affected.
💻 Affected Systems
- GONICUS GOsa
📦 What is this software?
Gosa by Gonicus
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise via administrative account takeover, leading to data exfiltration, privilege escalation, and lateral movement across the network.
Likely Case
Unauthorized access to user accounts containing 'success' in usernames, potentially exposing sensitive data and enabling further attacks.
If Mitigated
Limited impact if proper network segmentation and monitoring are in place, though authentication bypass remains a critical issue.
🎯 Exploit Status
Exploitation requires no authentication and is trivial to execute with simple HTTP requests.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Versions after 2019-04-11
Vendor Advisory: https://lists.debian.org/debian-lts-announce/2019/08/msg00009.html
Restart Required: Yes
Instructions:
1. Update GOsa to version after 2019-04-11. 2. Apply patches from GitHub repository. 3. Restart GOsa services. 4. Verify LDAP authentication is functioning correctly.
🔧 Temporary Workarounds
Username Filtering
linuxTemporarily block or rename accounts containing 'success' substring in usernames
ldapsearch -x -b 'ou=people,dc=example,dc=com' 'uid=*success*' | grep uid
ldapmodify -x -D 'cn=admin,dc=example,dc=com' -W -f rename.ldif
🧯 If You Can't Patch
- Implement network segmentation to isolate GOsa instances from critical systems
- Enable detailed authentication logging and monitor for suspicious login attempts
🔍 How to Verify
Check if Vulnerable:
Attempt to authenticate with any username containing 'success' and any password via GOsa web interface or API
Check Version:
grep 'Version' /usr/share/gosa/version.txt || dpkg -l | grep gosa
Verify Fix Applied:
After patching, verify that authentication with 'success' substring usernames and incorrect passwords fails
📡 Detection & Monitoring
Log Indicators:
- Failed authentication attempts for usernames containing 'success'
- Successful logins from unusual IP addresses with 'success' in username
Network Indicators:
- HTTP POST requests to authentication endpoints with 'success' in username parameters
SIEM Query:
source="gosa.log" AND (username="*success*" OR user="*success*") AND (action="login" OR action="authenticate")