Debian Security Advisory

DLA-3487-1 fusiondirectory -- LTS security update

Date Reported:
08 Jul 2023
Affected Packages:
fusiondirectory
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2022-36179, CVE-2022-36180.
More information:

A potential Cross Site Scripting (XSS) vulnerablity (CVE-2022-36180) and session handling vulnerability (CVE-2022-36179 )have been found in fusiondirectory, a Web Based LDAP Administration Program.

Additionally, fusiondirectory has been updated to address the API change in php-cas due to CVE-2022-39369. see DLA 3485-1Add for details.

Due to this, if CAS authentication is used, fusiondirectory will stop working until those steps are done:

- make sure to install the updated fusiondirectory-schema package for buster.

- update the fusiondirectory core schema in LDAP by running fusiondirectory-insert-schema -m

- switch to using the new php-cas API by running fusiondirectory-setup --set-config-CasLibraryBool=TRUE

- set the CAS ClientServiceName to the base URL of the fusiondirectory installation, for example: fusiondirectory-setup --set-config-CasClientServiceName="https://fusiondirectory.example.org/"

For Debian 10 buster, these problems have been fixed in version 1.2.3-4+deb10u2.

We recommend that you upgrade your fusiondirectory packages.

For the detailed security status of fusiondirectory please refer to its security tracker page at: https://security-tracker.debian.org/tracker/fusiondirectory

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS