#VU26577 LDAP injection in Apache Druid - CVE-2020-1958 

 

#VU26577 LDAP injection in Apache Druid - CVE-2020-1958

Published: April 4, 2020 / Updated: June 3, 2020


Vulnerability identifier: #VU26577
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/U:Green
CVE-ID: CVE-2020-1958
CWE-ID: CWE-90
Exploitation vector: Remote access
Exploit availability: Public exploit is available
Vulnerable software:
Apache Druid
Software vendor:
Apache Foundation

Description

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to improper input validation when processing DLAP queries.A remote non-authenticated user can use Druid API to retrieve any LDAP attribute values of users that exist on the LDAP server. A remote attacker with a valid set of LDAP credentials can send a specially crafted request to the Druid API and bypass the credentialsValidator.userSearch filter barrier that determines if a valid LDAP user is allowed to authenticate with Druid.

Successful exploitation of this vulnerability may allow an attacker to gain access to sensitive information and to escalate privileges within the application.


Remediation

Install updates from vendor's website.

External links