-
Notifications
You must be signed in to change notification settings - Fork 7.9k
Description
Description
Bouncy Castle For Java before 1.74 is affected by an LDAP injection vulnerability. The vulnerability only affects applications that use an LDAP CertStore from Bouncy Castle to validate X.509 certificates. During the certificate validation process, Bouncy Castle inserts the certificate's Subject Name into an LDAP search filter without any escaping, which leads to an LDAP injection vulnerability.
Source: Snyk Open Source
Location: pom.xml
This file introduces a vulnerable org.bouncycastle:bcprov-jdk15on package with a medium severity vulnerability.
(CVE-2023-33201) org.bouncycastle:[email protected]
- Package Manager: maven
- Vulnerable module: org.bouncycastle:bcprov-jdk15on
- Introduced through: org.keycloak:[email protected] and org.bouncycastle:[email protected]
Detailed paths
- Introduced through: org.keycloak:[email protected] › org.bouncycastle:[email protected]
Overview
org.bouncycastle:bcprov-jdk15on is a Java implementation of cryptographic algorithms.
Affected versions of this package are vulnerable to Information Exposure due to missing validation for the X.500 name of any certificate, subject, or issuer. The presence of a wild card may lead to information disclosure. This could allow a malicious user to obtain unauthorized information via blind LDAP Injection, exploring the environment and enumerating data.
Note:
The exploit depends on the structure of the target LDAP directory as well as what kind of errors are exposed to the user.
Remediation
A fix was pushed into the master branch but not yet published.