SB2022041201 - Remote code execution in NGINX LDAP reference implementation
Published: April 12, 2022
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Input validation error (CVE-ID: N/A)
The vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to insufficient validation of user-supplied input when processing HTTP request within NGINX LDAP reference implementation, when nginx or nginx plus are configured to proxy LDAP requests. A remote attacker can pass specially crafted input to the application and bypass LDAP authentication or execute arbitrary commands on the system.
Successful exploitation of the vulnerability may allow an attacker to compromise the affected system.
Remediation
Cybersecurity Help is not aware of any official remediation provided by the vendor.