CVE-2022-31084

8.1 HIGH

📋 TL;DR

CVE-2022-31084 is an arbitrary object instantiation vulnerability in LDAP Account Manager (LAM) that allows attackers to inject constructor arguments and potentially execute arbitrary code. This affects all LAM installations prior to version 8.0. Organizations using LAM for LDAP management are at risk of server compromise.

💻 Affected Systems

Products:
  • LDAP Account Manager (LAM)
Versions: All versions prior to 8.0
Operating Systems: All operating systems running LAM
Default Config Vulnerable: ⚠️ Yes
Notes: All LAM installations with default configurations are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data exfiltration, and lateral movement within the network.

🟠

Likely Case

Server compromise with administrative access to the LAM server and potentially the underlying LDAP directory.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent exploitation attempts.

🌐 Internet-Facing: HIGH - Web-accessible interface with potential for unauthenticated exploitation.
🏢 Internal Only: HIGH - Even internal attackers or compromised accounts could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit details and technical analysis available. The vulnerability is in the web interface and can be exploited remotely.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.0

Vendor Advisory: https://github.com/LDAPAccountManager/lam/security/advisories/GHSA-r387-grjx-qgvw

Restart Required: Yes

Instructions:

1. Backup current LAM configuration and data. 2. Download LAM version 8.0 or later from official repository. 3. Replace existing installation with new version. 4. Restart web server service. 5. Verify functionality.

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict network access to LAM web interface to only trusted IP addresses

# Use firewall rules to restrict access
iptables -A INPUT -p tcp --dport 80 -s trusted_ip -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -s trusted_ip -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

🧯 If You Can't Patch

  • Immediately restrict network access to LAM interface using firewall rules
  • Implement web application firewall (WAF) rules to block suspicious object instantiation attempts

🔍 How to Verify

Check if Vulnerable:

Check LAM version in web interface or configuration files. Versions below 8.0 are vulnerable.

Check Version:

grep 'lamVersion' /usr/share/ldap-account-manager/config/lam.conf or check web interface footer

Verify Fix Applied:

Verify LAM version is 8.0 or higher and check that the patch commit f1d5d04952f39a1b4ea203d3964fa88e1429dfd4 is applied.

📡 Detection & Monitoring

Log Indicators:

  • Unusual object instantiation attempts in LAM logs
  • Unexpected PHP class loading errors
  • Suspicious HTTP requests to LAM endpoints

Network Indicators:

  • HTTP POST requests with unusual parameters to LAM interface
  • Traffic patterns indicating exploitation attempts

SIEM Query:

source="lam_access.log" AND ("class" OR "object" OR "instantiate") AND status=200

🔗 References

📤 Share & Export