// For flags

CVE-2023-4501

Authentication bypass in OpenText (Micro Focus) Enterprise Server

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

User authentication with username and password credentials is ineffective in OpenText (Micro Focus) Visual COBOL, COBOL Server, Enterprise Developer, and Enterprise Server (including product variants such as Enterprise Test Server), versions 7.0 patch updates 19 and 20, 8.0 patch updates 8 and 9, and 9.0 patch update 1, when LDAP-based authentication is used with certain configurations. When the vulnerability is active, authentication succeeds with any valid username, regardless of whether the password is correct; it may also succeed with an invalid username (and any password). This allows an attacker with access to the product to impersonate any user.

Mitigations: The issue is corrected in the upcoming patch update for each affected product. Product overlays and workaround instructions are available through OpenText Support. The vulnerable configurations are believed to be uncommon.

Administrators can test for the vulnerability in their installations by attempting to sign on to a Visual COBOL or Enterprise Server component such as ESCWA using a valid username and incorrect password.

La autenticación de usuario con credenciales de nombre de usuario y contraseña no es efectiva en OpenText (Micro Focus), Visual COBOL, COBOL Server, Enterprise Developer y Enterprise Server (incluidas variantes de productos como Enterprise Test Server), versiones 7.0, actualizaciones de parches 19 y 20, actualizaciones de parches 8.0 8. y 9, y 9.0 update 1 del parche, cuando se utiliza la autenticación basada en LDAP con ciertas configuraciones. Cuando la vulnerabilidad está activa, la autenticación se realiza correctamente con cualquier nombre de usuario válido, independientemente de si la contraseña es correcta; también puede tener éxito con un nombre de usuario no válido (y cualquier contraseña). Esto permite que un atacante con acceso al producto se haga pasar por cualquier usuario. Mitigaciones: el problema se corrige en la próxima actualización del parche para cada producto afectado. Las superposiciones de productos y las instrucciones para solucionar el problema están disponibles a través del soporte de OpenText. Se cree que las configuraciones vulnerables son poco comunes. Los administradores pueden probar la vulnerabilidad en sus instalaciones intentando iniciar sesión en un componente de Visual COBOL o Enterprise Server como ESCWA utilizando un nombre de usuario válido y una contraseña incorrecta.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
None
Automatable
Yes
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2023-08-23 CVE Reserved
  • 2023-09-12 CVE Published
  • 2024-09-26 CVE Updated
  • 2024-10-14 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-253: Incorrect Check of Function Return Value
  • CWE-287: Improper Authentication
  • CWE-305: Authentication Bypass by Primary Weakness
  • CWE-358: Improperly Implemented Security Check for Standard
CAPEC
  • CAPEC-115: Authentication Bypass
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Microfocus
Search vendor "Microfocus"
Cobol Server
Search vendor "Microfocus" for product "Cobol Server"
7.0
Search vendor "Microfocus" for product "Cobol Server" and version "7.0"
patch_update_19
Affected
Microfocus
Search vendor "Microfocus"
Cobol Server
Search vendor "Microfocus" for product "Cobol Server"
7.0
Search vendor "Microfocus" for product "Cobol Server" and version "7.0"
patch_update_20
Affected
Microfocus
Search vendor "Microfocus"
Cobol Server
Search vendor "Microfocus" for product "Cobol Server"
8.0
Search vendor "Microfocus" for product "Cobol Server" and version "8.0"
patch_update_8
Affected
Microfocus
Search vendor "Microfocus"
Cobol Server
Search vendor "Microfocus" for product "Cobol Server"
8.0
Search vendor "Microfocus" for product "Cobol Server" and version "8.0"
patch_update_9
Affected
Microfocus
Search vendor "Microfocus"
Cobol Server
Search vendor "Microfocus" for product "Cobol Server"
9.0
Search vendor "Microfocus" for product "Cobol Server" and version "9.0"
patch_update_1
Affected
Microfocus
Search vendor "Microfocus"
Enterprise Developer
Search vendor "Microfocus" for product "Enterprise Developer"
7.0
Search vendor "Microfocus" for product "Enterprise Developer" and version "7.0"
patch_update_19
Affected
Microfocus
Search vendor "Microfocus"
Enterprise Developer
Search vendor "Microfocus" for product "Enterprise Developer"
7.0
Search vendor "Microfocus" for product "Enterprise Developer" and version "7.0"
patch_update_20
Affected
Microfocus
Search vendor "Microfocus"
Enterprise Developer
Search vendor "Microfocus" for product "Enterprise Developer"
8.0
Search vendor "Microfocus" for product "Enterprise Developer" and version "8.0"
patch_update_8
Affected
Microfocus
Search vendor "Microfocus"
Enterprise Developer
Search vendor "Microfocus" for product "Enterprise Developer"
8.0
Search vendor "Microfocus" for product "Enterprise Developer" and version "8.0"
patch_update_9
Affected
Microfocus
Search vendor "Microfocus"
Enterprise Developer
Search vendor "Microfocus" for product "Enterprise Developer"
9.0
Search vendor "Microfocus" for product "Enterprise Developer" and version "9.0"
patch_update_1
Affected
Microfocus
Search vendor "Microfocus"
Enterprise Server
Search vendor "Microfocus" for product "Enterprise Server"
7.0
Search vendor "Microfocus" for product "Enterprise Server" and version "7.0"
patch_update_19
Affected
Microfocus
Search vendor "Microfocus"
Enterprise Server
Search vendor "Microfocus" for product "Enterprise Server"
7.0
Search vendor "Microfocus" for product "Enterprise Server" and version "7.0"
patch_update_20
Affected
Microfocus
Search vendor "Microfocus"
Enterprise Server
Search vendor "Microfocus" for product "Enterprise Server"
8.0
Search vendor "Microfocus" for product "Enterprise Server" and version "8.0"
patch_update_8
Affected
Microfocus
Search vendor "Microfocus"
Enterprise Server
Search vendor "Microfocus" for product "Enterprise Server"
8.0
Search vendor "Microfocus" for product "Enterprise Server" and version "8.0"
patch_update_9
Affected
Microfocus
Search vendor "Microfocus"
Enterprise Server
Search vendor "Microfocus" for product "Enterprise Server"
9.0
Search vendor "Microfocus" for product "Enterprise Server" and version "9.0"
patch_update_1
Affected
Microfocus
Search vendor "Microfocus"
Enterprise Test Server
Search vendor "Microfocus" for product "Enterprise Test Server"
7.0
Search vendor "Microfocus" for product "Enterprise Test Server" and version "7.0"
patch_update_19
Affected
Microfocus
Search vendor "Microfocus"
Enterprise Test Server
Search vendor "Microfocus" for product "Enterprise Test Server"
7.0
Search vendor "Microfocus" for product "Enterprise Test Server" and version "7.0"
patch_update_20
Affected
Microfocus
Search vendor "Microfocus"
Enterprise Test Server
Search vendor "Microfocus" for product "Enterprise Test Server"
8.0
Search vendor "Microfocus" for product "Enterprise Test Server" and version "8.0"
patch_update_8
Affected
Microfocus
Search vendor "Microfocus"
Enterprise Test Server
Search vendor "Microfocus" for product "Enterprise Test Server"
8.0
Search vendor "Microfocus" for product "Enterprise Test Server" and version "8.0"
patch_update_9
Affected
Microfocus
Search vendor "Microfocus"
Enterprise Test Server
Search vendor "Microfocus" for product "Enterprise Test Server"
9.0
Search vendor "Microfocus" for product "Enterprise Test Server" and version "9.0"
patch_update_1
Affected
Microfocus
Search vendor "Microfocus"
Visual Cobol
Search vendor "Microfocus" for product "Visual Cobol"
7.0
Search vendor "Microfocus" for product "Visual Cobol" and version "7.0"
patch_update_19
Affected
Microfocus
Search vendor "Microfocus"
Visual Cobol
Search vendor "Microfocus" for product "Visual Cobol"
7.0
Search vendor "Microfocus" for product "Visual Cobol" and version "7.0"
patch_update_20
Affected
Microfocus
Search vendor "Microfocus"
Visual Cobol
Search vendor "Microfocus" for product "Visual Cobol"
8.0
Search vendor "Microfocus" for product "Visual Cobol" and version "8.0"
patch_update_8
Affected
Microfocus
Search vendor "Microfocus"
Visual Cobol
Search vendor "Microfocus" for product "Visual Cobol"
8.0
Search vendor "Microfocus" for product "Visual Cobol" and version "8.0"
patch_update_9
Affected
Microfocus
Search vendor "Microfocus"
Visual Cobol
Search vendor "Microfocus" for product "Visual Cobol"
9.0
Search vendor "Microfocus" for product "Visual Cobol" and version "9.0"
patch_update_1
Affected