main/java/org/apache/directory/groovyldap/LDAP.java in the Groovy LDAP API in Apache allows attackers to conduct LDAP entry poisoning attacks by leveraging setting returnObjFlag to true for all search methods.
References
Configurations
History
21 Nov 2024, 02:56
Type | Values Removed | Values Added |
---|---|---|
References | () http://svn.apache.org/viewvc/directory/sandbox/szoerner/groovyldap/src/main/java/org/apache/directory/groovyldap/LDAP.java?r1=1765362&r2=1765361&pathrev=1765362&view=patch - Mailing List, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/95929 - Third Party Advisory, VDB Entry | |
References | () https://mail-archives.apache.org/mod_mbox/directory-users/201610.mbox/%3Cb7d7e909-a8ed-1ab4-c853-4078c1e7624a%40stefan-seelmann.de%3E - Mailing List, Third Party Advisory | |
References | () https://www.blackhat.com/docs/us-16/materials/us-16-Munoz-A-Journey-From-JNDI-LDAP-Manipulation-To-RCE-wp.pdf - Technical Description, Third Party Advisory | |
References | () https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html - Patch |
Information
Published : 2017-01-18 22:59
Updated : 2024-11-21 02:56
NVD link : CVE-2016-6497
Mitre link : CVE-2016-6497
CVE.ORG link : CVE-2016-6497
JSON object : View
Products Affected
apache
- groovy_ldap
CWE
CWE-254
7PK - Security Features