{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T14:11:15.537","vulnerabilities":[{"cve":{"id":"CVE-2024-52792","sourceIdentifier":"security-advisories@github.com","published":"2024-12-17T22:15:07.083","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"LDAP Account Manager (LAM) is a php webfrontend for managing entries (e.g. users, groups, DHCP settings) stored in an LDAP directory. In affected versions LAM does not properly sanitize configuration values, that are set via `mainmanage.php` and `confmain.php`. This allows setting arbitrary config values and thus effectively bypassing `mitigation` of CVE-2024-23333/GHSA-fm9w-7m7v-wxqv. Configuration values for the main config or server profiles are set via `mainmanage.php` and `confmain.php`.\nThe values are written to `config.cfg` or `serverprofile.conf` in the format of `settingsName: settingsValue` line-by-line.\nAn attacker can smuggle arbitrary config values in a config file, by inserting a newline into certain config fields, followed by the value. This vulnerability has been addressed in version 9.0. All users are advised to upgrade. There are no known workarounds for this vulnerability."},{"lang":"es","value":"LDAP Account Manager (LAM) es una interfaz web php para administrar entradas (por ejemplo, usuarios, grupos, configuraciones DHCP) almacenado en un directorio LDAP. En las versiones afectadas, LAM no desinfecta correctamente los valores de configuración que se establecen a través de `mainmanage.php` y `confmain.php`. Esto permite establecer valores de configuración arbitrarios y, por lo tanto, evitar de manera efectiva la `mitigación` de CVE-2024-23333/GHSA-fm9w-7m7v-wxqv. Los valores de configuración para la configuración principal o los perfiles de servidor se establecen a través de `mainmanage.php` y `confmain.php`. Los valores se escriben en `config.cfg` o `serverprofile.conf` en el formato `settingsName: settingsValue` línea por línea. Un atacante puede contrabandear valores de configuración arbitrarios en un archivo de configuración, insertando una nueva línea en ciertos campos de configuración, seguida del valor. Esta vulnerabilidad se ha solucionado en la versión 9.0. Se recomienda a todos los usuarios que actualicen la versión. No existen workarounds conocidas para esta vulnerabilidad."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.2}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-610"}]}],"references":[{"url":"https://github.com/LDAPAccountManager/lam/blob/fd665fef3b222bf8205154b14f676815d2d6ae20/lam/templates/config/mainmanage.php#L263","source":"security-advisories@github.com"},{"url":"https://github.com/LDAPAccountManager/lam/releases/tag/9.0","source":"security-advisories@github.com"},{"url":"https://github.com/LDAPAccountManager/lam/security/advisories/GHSA-6cp9-j5r7-xhcc","source":"security-advisories@github.com"},{"url":"https://github.com/LDAPAccountManager/lam/security/advisories/GHSA-fm9w-7m7v-wxqv","source":"security-advisories@github.com"}]}}]}