CVE-2023-36496
📋 TL;DR
This vulnerability in PingDirectory's Delegated Admin Privilege virtual attribute provider plugin allows authenticated users to elevate their permissions within the Directory Server. It affects organizations using PingDirectory with this specific plugin enabled, potentially compromising directory data integrity and access controls.
💻 Affected Systems
- PingDirectory
📦 What is this software?
Pingdirectory by Pingidentity
Pingdirectory by Pingidentity
Pingdirectory by Pingidentity
Pingdirectory by Pingidentity
Pingdirectory by Pingidentity
Pingdirectory by Pingidentity
Pingdirectory by Pingidentity
⚠️ Risk & Real-World Impact
Worst Case
An authenticated attacker gains administrative privileges, enabling complete control over the directory server including data modification, user account manipulation, and potential lateral movement to connected systems.
Likely Case
Privileged users or attackers with stolen credentials exploit the flaw to access sensitive directory data, modify permissions, or disrupt directory services.
If Mitigated
With proper access controls and monitoring, impact is limited to detection of unauthorized privilege escalation attempts before significant damage occurs.
🎯 Exploit Status
Exploitation requires authenticated access to the directory server and the vulnerable plugin to be enabled.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 9.3.0.3 or later
Vendor Advisory: https://support.pingidentity.com/s/article/SECADV039
Restart Required: Yes
Instructions:
1. Download PingDirectory 9.3.0.3 or later from official sources. 2. Follow standard upgrade procedures for your deployment. 3. Restart directory server instances after upgrade.
🔧 Temporary Workarounds
Disable Vulnerable Plugin
allDisable the Delegated Admin Privilege virtual attribute provider plugin if not required.
dsconfig set-virtual-attribute-prop --plugin-name "Delegated Admin Privilege" --set enabled:false
🧯 If You Can't Patch
- Disable the Delegated Admin Privilege virtual attribute provider plugin immediately.
- Implement strict access controls and monitor for privilege escalation attempts in directory logs.
🔍 How to Verify
Check if Vulnerable:
Check if running PingDirectory 9.3.0.0-9.3.0.2 and verify if the Delegated Admin Privilege virtual attribute provider plugin is enabled using dsconfig.
Check Version:
dsframework version
Verify Fix Applied:
Confirm version is 9.3.0.3 or later and verify the plugin is either disabled or patched behavior is confirmed.
📡 Detection & Monitoring
Log Indicators:
- Unexpected privilege changes in access logs
- Authentication events followed by administrative operations from non-admin users
- Plugin configuration changes
Network Indicators:
- Unusual LDAP query patterns from authenticated users
- Administrative operations from unexpected source IPs
SIEM Query:
source="pingdirectory" AND (event_type="privilege_escalation" OR (user_privilege_change="true" AND plugin_name="Delegated Admin Privilege"))
🔗 References
- https://docs.pingidentity.com/r/en-us/pingdirectory-93/ynf1693338390284
- https://support.pingidentity.com/s/article/SECADV039
- https://www.pingidentity.com/en/resources/downloads/pingdirectory-downloads.html
- https://docs.pingidentity.com/r/en-us/pingdirectory-93/ynf1693338390284
- https://support.pingidentity.com/s/article/SECADV039
- https://www.pingidentity.com/en/resources/downloads/pingdirectory-downloads.html