| Vulnerability Name: | CVE-2017-14623 (CCN-132379) | ||||||||||||||||||||
| Assigned: | 2017-08-24 | ||||||||||||||||||||
| Published: | 2017-08-24 | ||||||||||||||||||||
| Updated: | 2019-10-03 | ||||||||||||||||||||
| Summary: | In the ldap.v2 (aka go-ldap) package through 2.5.0 for Go, an attacker may be able to login with an empty password. This issue affects an application using this package if these conditions are met: (1) it relies only on the return error of the Bind function call to determine whether a user is authorized (i.e., a nil return value is interpreted as successful authorization) and (2) it is used with an LDAP server allowing unauthenticated bind. | ||||||||||||||||||||
| CVSS v3 Severity: | 8.1 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) 7.1 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||||
| CVSS v2 Severity: | 5.1 Medium (CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||
| Vulnerability Type: | CWE-287 | ||||||||||||||||||||
| Vulnerability Consequences: | Bypass Security | ||||||||||||||||||||
| References: | Source: MITRE Type: CNA CVE-2017-14623 Source: XF Type: UNKNOWN ldap-cve201714623-sec-bypass(132379) Source: CCN Type: ldap GIT Repository Merge pull request #126 from tiziano88/check_empty_password Source: CONFIRM Type: Patch, Third Party Advisory https://github.com/go-ldap/ldap/commit/95ede1266b237bf8e9aa5dce0b3250e51bfefe66 Source: CONFIRM Type: Patch, Third Party Advisory https://github.com/go-ldap/ldap/pull/126 Source: CCN Type: IBM Security Bulletin 6833248 (CICS TX Standard) IBM CICS TX Standard is vulnerable to multiple vulnerabilities in Golang Go. Source: CCN Type: IBM Security Bulletin 6833250 (CICS TX Advanced) IBM CICS TX Advanced is vulnerable to multiple vulnerabilities in Golang Go. Source: CCN Type: WhiteSource Vulnerability Database CVE-2017-14623 | ||||||||||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||
| Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
| BACK | |||||||||||||||||||||