CVE-2023-36496 (GCVE-0-2023-36496)
Vulnerability from cvelistv5 – Published: 2024-02-01 23:00 – Updated: 2025-06-17 21:29
VLAI?
Title
Delegated Admin Virtual Attribute Provider Privilege Escalation
Summary
Delegated Admin Privilege virtual attribute provider plugin, when enabled, allows an authenticated user to elevate their permissions in the Directory Server.
Severity ?
7.7 (High)
CWE
- CWE-269 - Improper Privilege Management
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Ping Identity | PingDirectory |
Affected:
8.3 , ≤ 8.3.0.8
(8.3.0.9)
Affected: 9.0 , ≤ 9.0.0.5 (9.0.0.6) Affected: 9.1 , ≤ 9.1.0.2 (9.1.0.3) Affected: 9.2 , ≤ 9.2.0.1 (9.2.0.2) Affected: 9.3 , < 9.3.0.1 (9.3.0.1) |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T16:45:57.106Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://support.pingidentity.com/s/article/SECADV039"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.pingidentity.com/en/resources/downloads/pingdirectory-downloads.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://docs.pingidentity.com/r/en-us/pingdirectory-93/ynf1693338390284"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-36496",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-02-02T18:01:23.224460Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-06-17T21:29:22.156Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "PingDirectory",
"vendor": "Ping Identity",
"versions": [
{
"lessThanOrEqual": "8.3.0.8",
"status": "affected",
"version": "8.3",
"versionType": "8.3.0.9"
},
{
"lessThanOrEqual": "9.0.0.5",
"status": "affected",
"version": "9.0",
"versionType": "9.0.0.6"
},
{
"lessThanOrEqual": "9.1.0.2",
"status": "affected",
"version": "9.1",
"versionType": "9.1.0.3"
},
{
"lessThanOrEqual": "9.2.0.1",
"status": "affected",
"version": "9.2",
"versionType": "9.2.0.2"
},
{
"lessThan": "9.3.0.1",
"status": "affected",
"version": "9.3",
"versionType": "9.3.0.1"
}
]
}
],
"configurations": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Enable Delegated Admin virtual attribute provider"
}
],
"value": "Enable Delegated Admin virtual attribute provider"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDelegated Admin Privilege virtual attribute provider plugin, when enabled, allows an authenticated user to elevate their permissions in the Directory Server.\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "Delegated Admin Privilege virtual attribute provider plugin, when enabled, allows an authenticated user to elevate their permissions in the Directory Server.\n"
}
],
"impacts": [
{
"capecId": "CAPEC-122",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-122 Privilege Abuse"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-269",
"description": "CWE-269 Improper Privilege Management",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-02-01T23:00:03.660Z",
"orgId": "5998a2e9-ae88-42cd-b6e0-7564fd979f9e",
"shortName": "Ping Identity"
},
"references": [
{
"url": "https://support.pingidentity.com/s/article/SECADV039"
},
{
"url": "https://www.pingidentity.com/en/resources/downloads/pingdirectory-downloads.html"
},
{
"url": "https://docs.pingidentity.com/r/en-us/pingdirectory-93/ynf1693338390284"
}
],
"source": {
"advisory": "SECADV039",
"defect": [
"DS-47632"
],
"discovery": "INTERNAL"
},
"title": "Delegated Admin Virtual Attribute Provider Privilege Escalation",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "5998a2e9-ae88-42cd-b6e0-7564fd979f9e",
"assignerShortName": "Ping Identity",
"cveId": "CVE-2023-36496",
"datePublished": "2024-02-01T23:00:03.660Z",
"dateReserved": "2023-07-25T20:13:14.880Z",
"dateUpdated": "2025-06-17T21:29:22.156Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2023-36496\",\"sourceIdentifier\":\"responsible-disclosure@pingidentity.com\",\"published\":\"2024-02-01T23:15:09.107\",\"lastModified\":\"2024-11-21T08:09:49.830\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Delegated Admin Privilege virtual attribute provider plugin, when enabled, allows an authenticated user to elevate their permissions in the Directory Server.\\n\"},{\"lang\":\"es\",\"value\":\"El complemento del proveedor de atributos virtuales Delegated Admin Privilege, cuando est\u00e1 habilitado, permite a un usuario autenticado elevar sus permisos en Directory Server.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"responsible-disclosure@pingidentity.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L\",\"baseScore\":7.7,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":1.8,\"impactScore\":5.3},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"responsible-disclosure@pingidentity.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-269\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pingidentity:pingdirectory:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.3.0.0\",\"versionEndIncluding\":\"8.3.0.8\",\"matchCriteriaId\":\"2962B5D8-A12A-4D50-99AE-6355AB08F5DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pingidentity:pingdirectory:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.0.0.0\",\"versionEndIncluding\":\"9.0.0.5\",\"matchCriteriaId\":\"70836EEB-D037-4560-962B-630C9CCD1262\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pingidentity:pingdirectory:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.1.0.0\",\"versionEndIncluding\":\"9.1.0.2\",\"matchCriteriaId\":\"CBC21BB8-89C1-4DEA-A6D4-F44B99CEEB66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pingidentity:pingdirectory:9.2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"402022A7-8257-4453-A488-3B87767FFC2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pingidentity:pingdirectory:9.2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20441BBB-9D6F-4AB5-A007-087AEAE5B7C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pingidentity:pingdirectory:9.3.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66F04A80-B97A-4C03-B75B-F44CEAB7BE15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pingidentity:pingdirectory:9.3.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE606D4B-6F7A-4334-BB4E-8D161E3E9C35\"}]}]}],\"references\":[{\"url\":\"https://docs.pingidentity.com/r/en-us/pingdirectory-93/ynf1693338390284\",\"source\":\"responsible-disclosure@pingidentity.com\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://support.pingidentity.com/s/article/SECADV039\",\"source\":\"responsible-disclosure@pingidentity.com\",\"tags\":[\"Permissions Required\"]},{\"url\":\"https://www.pingidentity.com/en/resources/downloads/pingdirectory-downloads.html\",\"source\":\"responsible-disclosure@pingidentity.com\",\"tags\":[\"Product\"]},{\"url\":\"https://docs.pingidentity.com/r/en-us/pingdirectory-93/ynf1693338390284\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://support.pingidentity.com/s/article/SECADV039\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\"]},{\"url\":\"https://www.pingidentity.com/en/resources/downloads/pingdirectory-downloads.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Product\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://support.pingidentity.com/s/article/SECADV039\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.pingidentity.com/en/resources/downloads/pingdirectory-downloads.html\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://docs.pingidentity.com/r/en-us/pingdirectory-93/ynf1693338390284\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T16:45:57.106Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-36496\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-02-02T18:01:23.224460Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-06-17T21:23:40.724Z\"}}], \"cna\": {\"title\": \"Delegated Admin Virtual Attribute Provider Privilege Escalation\", \"source\": {\"defect\": [\"DS-47632\"], \"advisory\": \"SECADV039\", \"discovery\": \"INTERNAL\"}, \"impacts\": [{\"capecId\": \"CAPEC-122\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-122 Privilege Abuse\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 7.7, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"LOW\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Ping Identity\", \"product\": \"PingDirectory\", \"versions\": [{\"status\": \"affected\", \"version\": \"8.3\", \"versionType\": \"8.3.0.9\", \"lessThanOrEqual\": \"8.3.0.8\"}, {\"status\": \"affected\", \"version\": \"9.0\", \"versionType\": \"9.0.0.6\", \"lessThanOrEqual\": \"9.0.0.5\"}, {\"status\": \"affected\", \"version\": \"9.1\", \"versionType\": \"9.1.0.3\", \"lessThanOrEqual\": \"9.1.0.2\"}, {\"status\": \"affected\", \"version\": \"9.2\", \"versionType\": \"9.2.0.2\", \"lessThanOrEqual\": \"9.2.0.1\"}, {\"status\": \"affected\", \"version\": \"9.3\", \"lessThan\": \"9.3.0.1\", \"versionType\": \"9.3.0.1\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://support.pingidentity.com/s/article/SECADV039\"}, {\"url\": \"https://www.pingidentity.com/en/resources/downloads/pingdirectory-downloads.html\"}, {\"url\": \"https://docs.pingidentity.com/r/en-us/pingdirectory-93/ynf1693338390284\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Delegated Admin Privilege virtual attribute provider plugin, when enabled, allows an authenticated user to elevate their permissions in the Directory Server.\\n\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eDelegated Admin Privilege virtual attribute provider plugin, when enabled, allows an authenticated user to elevate their permissions in the Directory Server.\u003c/span\u003e\u003cbr\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-269\", \"description\": \"CWE-269 Improper Privilege Management\"}]}], \"configurations\": [{\"lang\": \"en\", \"value\": \"Enable Delegated Admin virtual attribute provider\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Enable Delegated Admin virtual attribute provider\", \"base64\": false}]}], \"providerMetadata\": {\"orgId\": \"5998a2e9-ae88-42cd-b6e0-7564fd979f9e\", \"shortName\": \"Ping Identity\", \"dateUpdated\": \"2024-02-01T23:00:03.660Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2023-36496\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-06-17T21:29:22.156Z\", \"dateReserved\": \"2023-07-25T20:13:14.880Z\", \"assignerOrgId\": \"5998a2e9-ae88-42cd-b6e0-7564fd979f9e\", \"datePublished\": \"2024-02-01T23:00:03.660Z\", \"assignerShortName\": \"Ping Identity\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…