CVE-2020-35518
Alibaba Cloud Linux (Aliyun Linux) vulnerability analysis and mitigation

Overview

CVE-2020-35518 is a security vulnerability discovered in 389-ds-base, affecting the LDAP authentication process. The vulnerability was identified in December 2020 and allows an unauthenticated attacker to determine whether specific entries exist in the LDAP database based on different responses during DN binding authentication (CVE Mitre).

Technical details

The vulnerability exists in the authentication mechanism where binding against a DN produces different responses depending on whether the DN exists or not. When attempting to bind to a non-existent DN, the server would return error 49 instead of error 32, and when binding to an entry without a userpassword attribute, it would return error 48 (inappropriate auth), inadvertently disclosing the entry's existence (Red Hat Bugzilla).

Impact

This vulnerability allows an unauthenticated attacker to enumerate valid entries in the LDAP database by observing different error messages returned during authentication attempts. This information disclosure could be used as a stepping stone for further attacks by helping attackers identify valid user accounts (Red Hat Advisory).

Mitigation and workarounds

The issue has been fixed in 389-ds-base versions 2.0.3, 1.4.4.13, and 1.4.3.19. The fix modifies the server response to always return error 49 (Invalid Credentials) regardless of whether the entry exists or not, eliminating the information disclosure (GitHub Commit).

Additional resources


SourceThis report was generated using AI

Related Alibaba Cloud Linux (Aliyun Linux) vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-59088HIGH8.6
  • Rocky LinuxRocky Linux
  • idm:DL1::python3-ipaserver
NoYesNov 12, 2025
CVE-2025-52565HIGH8.4
  • cAdvisorcAdvisor
  • eks-distro-1.31
NoYesNov 06, 2025
CVE-2025-11230HIGH7.5
  • HAProxyHAProxy
  • haproxy
NoYesNov 19, 2025
CVE-2025-52881HIGH7.3
  • cAdvisorcAdvisor
  • cni-plugins-fips
NoYesNov 06, 2025
CVE-2025-59089MEDIUM5.9
  • Rocky LinuxRocky Linux
  • idm:DL1::ipa-common
NoYesNov 12, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management