CVE-2024-54852
Published: 29 January 2025
Summary
CVE-2024-54852 is a critical-severity LDAP Injection (CWE-90) vulnerability in Sismics Teedy. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Password Spraying (T1110.003); ranked at the 31.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires validation and sanitization of user inputs like the login username field to prevent LDAP injection attacks.
Mandates identification, reporting, and correction of flaws such as improper input sanitization in LDAP query construction.
Provides management of accounts to detect and prevent unauthorized creations resulting from exploited LDAP injection.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
LDAP injection in the public-facing login form enables unauthenticated exploitation (T1190), arbitrary account creation (T1136), and password spraying (T1110.003).
NVD Description
When LDAP connection is activated in Teedy versions between 1.9 to 1.12, the username field of the login form is vulnerable to LDAP injection. Due to improper sanitization of user input, an unauthenticated attacker is then able to perform various…
more
malicious actions, such as creating arbitrary accounts and spraying passwords.
Deeper analysisAI
CVE-2024-54852 is an LDAP injection vulnerability (CWE-90) in Teedy versions 1.9 through 1.12 when LDAP connection is activated. The flaw arises from improper sanitization of user input in the username field of the login form, enabling injection of malicious LDAP queries. It carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), reflecting critical severity due to its network accessibility and lack of prerequisites.
An unauthenticated attacker can exploit the vulnerability remotely by submitting crafted input to the login form's username field. Successful exploitation allows various malicious LDAP actions, including creating arbitrary accounts and performing password spraying.
Advisories and further details, including potential mitigation guidance, are available in the referenced GitHub repository at https://github.com/Tanguy-Boisset/CVE/blob/master/CVE-2024-54852/README.md.
Details
- CWE(s)