|
Message-ID: <2640261.krIbtSRUe9@golgafrichnam> Date: Fri, 19 Jun 2020 20:31:22 +0200 From: Martin <martin_s@...che.org> To: users@...hiva.apache.org, announce@...che.org, dev@...hiva.apache.org Cc: users@...en.apache.org, oss-security@...ts.openwall.com, bugtraq@...urityfocus.com Subject: [SECURITY] CVE-2020-9495: Apache Archiva login service is vulnerable to LDAP injection CVE-2020-9495: Apache Archiva login service is vulnerable to LDAP injection Severity: Medium Vendor: The Apache Software Foundation Versions Affected: Apache Archiva all versions before 2.2.5 By providing special values to the archiva login form a attacker is able to retrieve user attribute data from the connected LDAP server. With certain characters it is possible to modify the LDAP filter used to query the users on the connected LDAP server. By measuring the response time, arbitrary attribute data can be retrieved from LDAP user objects. Mitigation: Upgrade to Apache Archiva 2.2.5 or higher References: http://archiva.apache.org/security.html#CVE-2020-9495 The newest Archiva version can be downloaded from: http://archiva.apache.org/download.cgi
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.