Authentication bypass in Spring-LDPA - CVE-2017-8028

 

Authentication bypass in Spring-LDPA - CVE-2017-8028

Published: November 27, 2017


Vulnerability identifier: #VU9424
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2017-8028
CWE-ID: CWE-592
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Pivotal
Affected software:
Spring-LDPA

Detailed vulnerability description

The vulnerability allows a remote attacker to bypass authentication on the target system.

The weakness exists due to some LDAP vendors require an explicit operation for the LDAP bind to take effect. A remote attacker with knowledge of the username can authenticate with an arbitrary password when connected to some LDAP servers, when no additional attributes are bound, and when using LDAP BindAuthenticator with org.springframework.ldap.core.support.DefaultTlsDirContextAuthenticationStrategy as the authentication strategy, and setting userSearch.

How to mitigate CVE-2017-8028

Update to version 2.3.2.

Sources