Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAHKghTNBe6x=Hn=pf2pVxqovHCfa=_d6EFQKMGmb__X5fsn_kg@mail.gmail.com>
Date: Wed, 1 Apr 2020 12:19:01 -0700
From: Jonathan Wei <jonwei@...che.org>
To: oss-security@...ts.openwall.com
Subject: [CVE-2020-1958]: Apache Druid LDAP injection vulnerability

Severity: High

Vendor:
The Apache Software Foundation

Versions Affected:
Druid 0.17.0

Description:
When LDAP authentication is enabled:
- Callers of Druid APIs with a valid set of LDAP credentials can bypass the
`credentialsValidator.userSearch` filter barrier that determines if a valid
LDAP user is allowed to authenticate with Druid. They are still subject to
role-based authorization checks, if configured.
- Callers of Druid APIs can retrieve any LDAP attribute values of users
that exist on the LDAP server, so long as that information is visible to
the Druid server. This information disclosure does not require the caller
itself to be a valid LDAP user.

Mitigation:
- Users of Druid 0.17.0 that use LDAP authentication should upgrade to
Druid 0.17.1.

Credit:
This issue was discovered by Grzegorz GoĊ‚awski.

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.