CVE-2023-36496

7.7 HIGH

📋 TL;DR

This vulnerability in PingDirectory's Delegated Admin Privilege virtual attribute provider plugin allows authenticated users to elevate their permissions within the Directory Server. It affects organizations using PingDirectory with this specific plugin enabled, potentially compromising directory data integrity and access controls.

💻 Affected Systems

Products:
  • PingDirectory
Versions: 9.3.0.0 through 9.3.0.2
Operating Systems: All supported platforms
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when the Delegated Admin Privilege virtual attribute provider plugin is enabled. Default installations are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker gains administrative privileges, enabling complete control over the directory server including data modification, user account manipulation, and potential lateral movement to connected systems.

🟠

Likely Case

Privileged users or attackers with stolen credentials exploit the flaw to access sensitive directory data, modify permissions, or disrupt directory services.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to detection of unauthorized privilege escalation attempts before significant damage occurs.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to the directory server and the vulnerable plugin to be enabled.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.3.0.3 or later

Vendor Advisory: https://support.pingidentity.com/s/article/SECADV039

Restart Required: Yes

Instructions:

1. Download PingDirectory 9.3.0.3 or later from official sources. 2. Follow standard upgrade procedures for your deployment. 3. Restart directory server instances after upgrade.

🔧 Temporary Workarounds

Disable Vulnerable Plugin

all

Disable the Delegated Admin Privilege virtual attribute provider plugin if not required.

dsconfig set-virtual-attribute-prop --plugin-name "Delegated Admin Privilege" --set enabled:false

🧯 If You Can't Patch

  • Disable the Delegated Admin Privilege virtual attribute provider plugin immediately.
  • Implement strict access controls and monitor for privilege escalation attempts in directory logs.

🔍 How to Verify

Check if Vulnerable:

Check if running PingDirectory 9.3.0.0-9.3.0.2 and verify if the Delegated Admin Privilege virtual attribute provider plugin is enabled using dsconfig.

Check Version:

dsframework version

Verify Fix Applied:

Confirm version is 9.3.0.3 or later and verify the plugin is either disabled or patched behavior is confirmed.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege changes in access logs
  • Authentication events followed by administrative operations from non-admin users
  • Plugin configuration changes

Network Indicators:

  • Unusual LDAP query patterns from authenticated users
  • Administrative operations from unexpected source IPs

SIEM Query:

source="pingdirectory" AND (event_type="privilege_escalation" OR (user_privilege_change="true" AND plugin_name="Delegated Admin Privilege"))

🔗 References

📤 Share & Export