main/java/org/apache/directory/groovyldap/LDAP.java in the Groovy LDAP API in Apache allows attackers to conduct LDAP entry poisoning attacks by leveraging setting returnObjFlag to true for all search methods.
References
Link | Resource |
---|---|
https://www.blackhat.com/docs/us-16/materials/us-16-Munoz-A-Journey-From-JNDI-LDAP-Manipulation-To-RCE-wp.pdf | Technical Description Third Party Advisory |
https://mail-archives.apache.org/mod_mbox/directory-users/201610.mbox/%3Cb7d7e909-a8ed-1ab4-c853-4078c1e7624a%40stefan-seelmann.de%3E | Mailing List Third Party Advisory |
http://svn.apache.org/viewvc/directory/sandbox/szoerner/groovyldap/src/main/java/org/apache/directory/groovyldap/LDAP.java?r1=1765362&r2=1765361&pathrev=1765362&view=patch | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/95929 | Third Party Advisory VDB Entry |
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html | Patch |
Configurations
Information
Published : 2017-01-18 14:59
Updated : 2020-05-28 08:59
NVD link : CVE-2016-6497
Mitre link : CVE-2016-6497
JSON object : View
CWE
CWE-254
7PK - Security Features
Products Affected
apache
- groovy_ldap