-
Notifications
You must be signed in to change notification settings - Fork 47
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
libpam4j authenticates invalid accounts #18
Comments
I have run into this issue as well. This is a pretty major bug in libpam4j, is it not? Is anyone maintaining this currently?? |
[kohsuke#18] Change-Id: I5052cd0d9f617239a63fb036daa697cbae5bb9d7
This issue has been assigned CVE-2017-12197. Apparently it was patched by Red Hat but I have no information if they intend to forward the patch. |
I feel terrible for not noticing this sooner, but I just committed a fix for this. |
This fixes issue #18 and thus CVE-2017-12197
Currently, the call to pam_acct_mgmt is commented out in PAM.authenticate. Thus any login restrictions configured via PAM account modules are ignored by PAM.authenticate.
This usually affects, among others, settings in /etc/security/access.conf (pam_access), /etc/nologin (pam_nologin) and host/service name authorization of pam_ldap.
Any return value other than PAM_SUCCESS from pam_acct_mgmt should prevent a successful authentication.
The text was updated successfully, but these errors were encountered: