CVE-2017-8028: Spring-LDAP authentication with userSearch and STARTTLS allows authentication with arbitrary password

HIGH | OCTOBER 16, 2017 | CVE-2017-8028

Description

When connected to some LDAP servers, when no additional attributes are bound, and when using LDAP BindAuthenticator with org.springframework.ldap.core.support.DefaultTlsDirContextAuthenticationStrategy as the authentication strategy, and setting userSearch, authentication is allowed with an arbitrary password when the username is correct. This occurs because some LDAP vendors require an explicit operation for the LDAP bind to take effect.

Affected Spring Products and Versions

  • Spring-LDAP versions 1.3.0 - 2.3.1

Mitigation

Users of affected versions should apply the following mitigation:

  • Upgrade to Spring-LDAP version 2.3.2.RELEASE+

Credit

This vulnerability was responsibly reported by Tobias Schneider.

References

History

2017-10-16: Initial vulnerability report published

Get ahead

VMware offers training and certification to turbo-charge your progress.

Learn more

Get support

Tanzu Spring offers support and binaries for OpenJDK™, Spring, and Apache Tomcat® in one simple subscription.

Learn more

Upcoming events

Check out all the upcoming events in the Spring community.

View all