main/java/org/apache/directory/groovyldap/LDAP.java in the Groovy LDAP API in Apache allows attackers to conduct LDAP entry poisoning attacks by leveraging setting returnObjFlag to true for all search methods.
References
Link | Resource |
---|---|
http://svn.apache.org/viewvc/directory/sandbox/szoerner/groovyldap/src/main/java/org/apache/directory/groovyldap/LDAP.java?r1=1765362&r2=1765361&pathrev=1765362&view=patch | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/95929 | Third Party Advisory VDB Entry |
https://mail-archives.apache.org/mod_mbox/directory-users/201610.mbox/%3Cb7d7e909-a8ed-1ab4-c853-4078c1e7624a%40stefan-seelmann.de%3E | Mailing List Third Party Advisory |
https://www.blackhat.com/docs/us-16/materials/us-16-Munoz-A-Journey-From-JNDI-LDAP-Manipulation-To-RCE-wp.pdf | Technical Description Third Party Advisory |
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html | Patch |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: hpe
Published: 2017-01-18T22:00:00
Updated: 2019-07-23T22:31:31
Reserved: 2016-08-01T00:00:00
Link: CVE-2016-6497
JSON object: View
NVD Information
Status : Analyzed
Published: 2017-01-18T22:59:00.860
Modified: 2020-05-28T15:59:44.463
Link: CVE-2016-6497
JSON object: View
Redhat Information
No data.
CWE