跳转到帖子

Red Hat JBossEAP: Improper Certificate Validation (CVE-2023-33201)

recommended_posts

发布于
  • Members

Red Hat JBossEAP: Improper Certificate Validation (CVE-2023-33201)

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:N)
Published
06/16/2023
Created
09/20/2024
Added
09/19/2024
Modified
12/20/2024

Description

Bouncy Castle For Java before 1.74 is affected by an LDAP injection vulnerability. The vulnerability only affects applications that use an LDAP CertStore from Bouncy Castle to validate X.509 certificates. During the certificate validation process, Bouncy Castle inserts the certificate's Subject Name into an LDAP search filter without any escaping, which leads to an LDAP injection vulnerability.. A flaw was found in Bouncy Castle 1.73. This issue targets the fix of LDAP wild cards. Before the fix there was no validation for the X.500 name of any certificate, subject, or issuer, so the presence of a wild card may lead to information disclosure. This could allow a malicious user to obtain unauthorized information via blind LDAP Injection, exploring the environment and enumerating data. The exploit depends on the structure of the target LDAP directory as well as what kind of errors are exposed to the user.

Solution(s)

  • red-hat-jboss-eap-upgrade-latest

References

  • https://attackerkb.com/topics/cve-2023-33201
  • CVE - 2023-33201
  • https://access.redhat.com/security/cve/CVE-2023-33201
  • https://bugzilla.redhat.com/show_bug.cgi?id=2215465
  • https://github.com/bcgit/bc-java/wiki/CVE-2023-33201
  • https://access.redhat.com/errata/RHSA-2023:5484
  • https://access.redhat.com/errata/RHSA-2023:5485
  • https://access.redhat.com/errata/RHSA-2023:5486
  • https://access.redhat.com/errata/RHSA-2023:5488
View more
  • 查看数 698
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…