Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-8028

Опубликовано: 16 окт. 2017
Источник: redhat
CVSS3: 7.4

Описание

In Pivotal Spring-LDAP versions 1.3.0 - 2.3.1, when connected to some LDAP servers, when no additional attributes are bound, and when using LDAP BindAuthenticator with org.springframework.ldap.core.support.DefaultTlsDirContextAuthenticationStrategy as the authentication strategy, and setting userSearch, authentication is allowed with an arbitrary password when the username is correct. This occurs because some LDAP vendors require an explicit operation for the LDAP bind to take effect.

A vulnerability was found in spring-ldap that allows an attacker to authenticate with an arbitrary password. When spring-ldap connected to some LDAP servers, when no additional attributes are bound, when using LDAP BindAuthenticator with org.springframework.ldap.core.support.DefaultTlsDirContextAuthenticationStrategy as the authentication strategy, and when setting userSearch, authentication is allowed with an arbitrary password when the username is correct.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Fuse 7spring-ldap-coreAffected
Red Hat Storage 3spring-ldap-coreWill not fix
Red Hat JBoss A-MQ 6.3CamelFixedRHSA-2018:031914.02.2018
Red Hat JBoss Fuse 6.3CamelFixedRHSA-2018:031914.02.2018

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-287
https://bugzilla.redhat.com/show_bug.cgi?id=1510968spring-ldap: Authentication with userSearch and STARTTLS allows authentication with arbitrary password

7.4 High

CVSS3

Связанные уязвимости

CVSS3: 8.1
ubuntu
около 8 лет назад

In Pivotal Spring-LDAP versions 1.3.0 - 2.3.1, when connected to some LDAP servers, when no additional attributes are bound, and when using LDAP BindAuthenticator with org.springframework.ldap.core.support.DefaultTlsDirContextAuthenticationStrategy as the authentication strategy, and setting userSearch, authentication is allowed with an arbitrary password when the username is correct. This occurs because some LDAP vendors require an explicit operation for the LDAP bind to take effect.

CVSS3: 8.1
nvd
около 8 лет назад

In Pivotal Spring-LDAP versions 1.3.0 - 2.3.1, when connected to some LDAP servers, when no additional attributes are bound, and when using LDAP BindAuthenticator with org.springframework.ldap.core.support.DefaultTlsDirContextAuthenticationStrategy as the authentication strategy, and setting userSearch, authentication is allowed with an arbitrary password when the username is correct. This occurs because some LDAP vendors require an explicit operation for the LDAP bind to take effect.

CVSS3: 8.1
debian
около 8 лет назад

In Pivotal Spring-LDAP versions 1.3.0 - 2.3.1, when connected to some ...

CVSS3: 8.1
github
больше 3 лет назад

Improper Authentication in Pivotal Spring-LDAP

CVSS3: 8.1
fstec
около 8 лет назад

Уязвимость LDAP модуля Java-фреймворка для обеспечения безопасности промышленных приложений Spring Security, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

7.4 High

CVSS3