eLabFTW is an electronic lab notebook manager for research teams. In versions prior to 4.2.0 there is a vulnerability which allows an attacker to authenticate as an existing user, if that user was created using a single sign-on authentication option such as LDAP or SAML. It impacts instances where LDAP or SAML is used for authentication instead of the (default) local password mechanism. Users should upgrade to at least version 4.2.0.
References
Link | Resource |
---|---|
https://github.com/elabftw/elabftw/releases/tag/4.2.0 | Release Notes Third Party Advisory |
https://github.com/elabftw/elabftw/security/advisories/GHSA-98rp-gx76-33ph | Third Party Advisory |
Configurations
History
21 Dec 2021, 15:58
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 6.5
v3 : 9.8 |
CPE | cpe:2.3:a:elabftw:elabftw:*:*:*:*:*:*:*:* | |
References | (MISC) https://github.com/elabftw/elabftw/releases/tag/4.2.0 - Release Notes, Third Party Advisory | |
References | (CONFIRM) https://github.com/elabftw/elabftw/security/advisories/GHSA-98rp-gx76-33ph - Third Party Advisory |
16 Dec 2021, 00:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-12-16 00:15
Updated : 2024-02-04 22:08
NVD link : CVE-2021-43834
Mitre link : CVE-2021-43834
CVE.ORG link : CVE-2021-43834
JSON object : View
Products Affected
elabftw
- elabftw
CWE
CWE-287
Improper Authentication