CVE-2022-31085: CWE-311: Missing Encryption of Sensitive Data in LDAPAccountManager lam
LDAP Account Manager (LAM) is a webfrontend for managing entries (e.g. users, groups, DHCP settings) stored in an LDAP directory. In versions prior to 8.0 the session files include the LDAP user name and password in clear text if the PHP OpenSSL extension is not installed or encryption is disabled by configuration. This issue has been fixed in version 8.0. Users unable to upgrade should install the PHP OpenSSL extension and make sure session encryption is enabled in LAM main configuration.
AI Analysis
Technical Summary
CVE-2022-31085 is a vulnerability affecting LDAP Account Manager (LAM), a web-based frontend used to manage LDAP directory entries such as users, groups, and DHCP settings. The vulnerability exists in versions prior to 8.0, where session files store LDAP user credentials (username and password) in clear text if the PHP OpenSSL extension is not installed or if session encryption is disabled in the LAM configuration. This issue is categorized under CWE-311, which refers to the missing encryption of sensitive data during storage or transmission. The exposure of plaintext credentials in session files poses a significant risk because these files can be accessed by unauthorized users or processes on the server, potentially leading to credential theft and unauthorized LDAP directory access. The vulnerability has been addressed in LAM version 8.0 by ensuring encryption of session data. For users unable to upgrade immediately, the recommended mitigation is to install the PHP OpenSSL extension and enable session encryption within the LAM configuration to protect sensitive session data. No known exploits have been reported in the wild, but the risk remains due to the sensitive nature of the data exposed and the potential for lateral movement within networks if credentials are compromised.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized access to LDAP directories, which often serve as central repositories for user authentication and authorization data. Compromise of LDAP credentials can enable attackers to escalate privileges, access sensitive internal resources, and disrupt identity management processes. This is particularly critical for sectors relying heavily on centralized identity management such as government agencies, financial institutions, healthcare providers, and large enterprises. The exposure of plaintext credentials in session files could also facilitate insider threats or attacks leveraging compromised servers. Given that LDAP Account Manager is used across various industries in Europe, exploitation could result in data breaches, service disruptions, and compliance violations under regulations like GDPR. The absence of encryption in session files undermines confidentiality and integrity of authentication data, increasing the attack surface for credential theft and subsequent attacks.
Mitigation Recommendations
1. Immediate upgrade to LDAP Account Manager version 8.0 or later, where the vulnerability is fixed by default. 2. For environments where upgrading is not immediately feasible, ensure the PHP OpenSSL extension is installed and properly configured on the web server hosting LAM. 3. Enable session encryption explicitly in the LAM main configuration to prevent storage of sensitive data in plaintext. 4. Restrict file system permissions on session storage directories to minimize unauthorized access. 5. Regularly audit and monitor access logs for unusual activity related to LAM sessions or LDAP authentication attempts. 6. Implement network segmentation and access controls to limit exposure of the LAM server and LDAP infrastructure. 7. Educate system administrators about the risks of storing sensitive data unencrypted and enforce secure configuration management practices. 8. Consider deploying host-based intrusion detection systems (HIDS) to detect unauthorized access to session files.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden, Poland, Austria
CVE-2022-31085: CWE-311: Missing Encryption of Sensitive Data in LDAPAccountManager lam
Description
LDAP Account Manager (LAM) is a webfrontend for managing entries (e.g. users, groups, DHCP settings) stored in an LDAP directory. In versions prior to 8.0 the session files include the LDAP user name and password in clear text if the PHP OpenSSL extension is not installed or encryption is disabled by configuration. This issue has been fixed in version 8.0. Users unable to upgrade should install the PHP OpenSSL extension and make sure session encryption is enabled in LAM main configuration.
AI-Powered Analysis
Technical Analysis
CVE-2022-31085 is a vulnerability affecting LDAP Account Manager (LAM), a web-based frontend used to manage LDAP directory entries such as users, groups, and DHCP settings. The vulnerability exists in versions prior to 8.0, where session files store LDAP user credentials (username and password) in clear text if the PHP OpenSSL extension is not installed or if session encryption is disabled in the LAM configuration. This issue is categorized under CWE-311, which refers to the missing encryption of sensitive data during storage or transmission. The exposure of plaintext credentials in session files poses a significant risk because these files can be accessed by unauthorized users or processes on the server, potentially leading to credential theft and unauthorized LDAP directory access. The vulnerability has been addressed in LAM version 8.0 by ensuring encryption of session data. For users unable to upgrade immediately, the recommended mitigation is to install the PHP OpenSSL extension and enable session encryption within the LAM configuration to protect sensitive session data. No known exploits have been reported in the wild, but the risk remains due to the sensitive nature of the data exposed and the potential for lateral movement within networks if credentials are compromised.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized access to LDAP directories, which often serve as central repositories for user authentication and authorization data. Compromise of LDAP credentials can enable attackers to escalate privileges, access sensitive internal resources, and disrupt identity management processes. This is particularly critical for sectors relying heavily on centralized identity management such as government agencies, financial institutions, healthcare providers, and large enterprises. The exposure of plaintext credentials in session files could also facilitate insider threats or attacks leveraging compromised servers. Given that LDAP Account Manager is used across various industries in Europe, exploitation could result in data breaches, service disruptions, and compliance violations under regulations like GDPR. The absence of encryption in session files undermines confidentiality and integrity of authentication data, increasing the attack surface for credential theft and subsequent attacks.
Mitigation Recommendations
1. Immediate upgrade to LDAP Account Manager version 8.0 or later, where the vulnerability is fixed by default. 2. For environments where upgrading is not immediately feasible, ensure the PHP OpenSSL extension is installed and properly configured on the web server hosting LAM. 3. Enable session encryption explicitly in the LAM main configuration to prevent storage of sensitive data in plaintext. 4. Restrict file system permissions on session storage directories to minimize unauthorized access. 5. Regularly audit and monitor access logs for unusual activity related to LAM sessions or LDAP authentication attempts. 6. Implement network segmentation and access controls to limit exposure of the LAM server and LDAP infrastructure. 7. Educate system administrators about the risks of storing sensitive data unencrypted and enforce secure configuration management practices. 8. Consider deploying host-based intrusion detection systems (HIDS) to detect unauthorized access to session files.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-05-18T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9844c4522896dcbf3631
Added to database: 5/21/2025, 9:09:24 AM
Last enriched: 6/23/2025, 3:37:07 AM
Last updated: 8/8/2025, 12:12:23 AM
Views: 11
Related Threats
CVE-2025-52621: CWE-346 Origin Validation Error in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52620: CWE-20 Improper Input Validation in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52619: CWE-209 Generation of Error Message Containing Sensitive Information in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52618: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in HCL Software BigFix SaaS Remediate
MediumCVE-2025-43201: An app may be able to unexpectedly leak a user's credentials in Apple Apple Music Classical for Android
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.