Vulnerability Name: | CVE-2017-8028 (CCN-135393) | ||||||||||||
Assigned: | 2017-10-16 | ||||||||||||
Published: | 2017-10-16 | ||||||||||||
Updated: | 2021-01-20 | ||||||||||||
Summary: | In Pivotal Spring-LDAP versions 1.3.0 - 2.3.1, when connected to some LDAP servers, when no additional attributes are bound, and when using LDAP BindAuthenticator with org.springframework.ldap.core.support.DefaultTlsDirContextAuthenticationStrategy as the authentication strategy, and setting userSearch, authentication is allowed with an arbitrary password when the username is correct. This occurs because some LDAP vendors require an explicit operation for the LDAP bind to take effect. | ||||||||||||
CVSS v3 Severity: | 8.1 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) 7.1 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 5.1 Medium (CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Type: | CWE-287 | ||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2017-8028 Source: REDHAT Type: UNKNOWN RHSA-2018:0319 Source: XF Type: UNKNOWN pivotal-cve20178028-sec-bypass(135393) Source: MLIST Type: UNKNOWN [debian-lts-announce] 20171119 [SECURITY] [DLA 1180-1] libspring-ldap-java security update Source: CCN Type: Pivotal Web site CVE-2017-8028: Spring-LDAP authentication with userSearch and STARTTLS allows authentication with arbitrary password Source: CONFIRM Type: Issue Tracking, Vendor Advisory https://pivotal.io/security/cve-2017-8028 Source: DEBIAN Type: Issue Tracking, Third Party Advisory DSA-4046 Source: CCN Type: Oracle CPUJan2021 Oracle Critical Patch Update Advisory - January 2021 Source: MISC Type: UNKNOWN https://www.oracle.com/security-alerts/cpujan2021.html Source: CCN Type: WhiteSource Vulnerability Database CVE-2017-8028 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
Oval Definitions | |||||||||||||
| |||||||||||||
BACK |